Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions
Questions # 81:

What is the FIRST step in developing the vulnerability management program?

Options:

A.

Baseline the Environment


B.

Maintain and Monitor


C.

Organization Vulnerability


D.

Define Policy


Expert Solution
Questions # 82:

Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?

Options:

A.

Configure logging on each access point


B.

Install a firewall software on each wireless access point.


C.

Provide IP and MAC address


D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.


Expert Solution
Questions # 83:

Physical security measures typically include which of the following components?

Options:

A.

Physical, Technical, Operational


B.

Technical, Strong Password, Operational


C.

Operational, Biometric, Physical


D.

Strong password, Biometric, Common Access Card


Expert Solution
Questions # 84:

You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?

Options:

A.

Execute


B.

Read


C.

Administrator


D.

Public


Expert Solution
Questions # 85:

When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

Options:

A.

ISO 27001


B.

PRINCE2


C.

ISO 27004


D.

ITILv3


Expert Solution
Questions # 86:

A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?

Options:

A.

Have internal audit conduct another audit to see what has changed.


B.

Contract with an external audit company to conduct an unbiased audit


C.

Review the recommendations and follow up to see if audit implemented the changes


D.

Meet with audit team to determine a timeline for corrections


Expert Solution
Questions # 87:

The regular review of a firewall ruleset is considered a

Options:

A.

Procedural control


B.

Organization control


C.

Technical control


D.

Management control


Expert Solution
Questions # 88:

Risk that remains after risk mitigation is known as

Options:

A.

Persistent risk


B.

Residual risk


C.

Accepted risk


D.

Non-tolerated risk


Expert Solution
Questions # 89:

An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?

Options:

A.

Determine the annual loss expectancy (ALE)


B.

Create a crisis management plan


C.

Create technology recovery plans


D.

Build a secondary hot site


Expert Solution
Questions # 90:

The Information Security Governance program MUST:

Options:

A.

integrate with other organizational governance processes


B.

support user choice for Bring Your Own Device (BYOD)


C.

integrate with other organizational governance processes


D.

show a return on investment for the organization


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions