Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil CCISO 712-50 Questions and answers with Dumpstech

Exam 712-50 Premium Access

View all detail and faqs for the 712-50 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions
Questions # 31:

What process is used to identify and collect information to support legal requests?

Options:

A.

Evidence submission

B.

Data sharing

C.

Electronic discovery

D.

Information relegation

Questions # 32:

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

Options:

A.

Risk Assessment

B.

Incident Response

C.

Risk Management

D.

Network Security administration

Questions # 33:

Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?

Options:

A.

Configure logging on each access point

B.

Install a firewall software on each wireless access point.

C.

Provide IP and MAC address

D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

Questions # 34:

What is the PRIMARY weakness of a Cost Benefit Analysis (CBA)?

Options:

A.

It is not used very often

B.

It is not always precise

C.

It is not effective for mid-sized investments

D.

A positive result is an indication that the effort should be pursued

Questions # 35:

How often should the SSAE16 report of your vendors be reviewed?

Options:

A.

Quarterly

B.

Semi-annually

C.

Annually

D.

Bi-annually

Questions # 36:

What two methods are used to assess risk impact?

Options:

A.

Cost and annual rate of expectance

B.

Subjective and Objective

C.

Qualitative and percent of loss realized

D.

Quantitative and qualitative

Questions # 37:

In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?

Options:

A.

The organization uses exclusively a quantitative process to measure risk

B.

The organization uses exclusively a qualitative process to measure risk

C.

The organization’s risk tolerance is high

D.

The organization’s risk tolerance is lo

Questions # 38:

What key technology can mitigate ransomware threats?

Options:

A.

Use immutable data storage

B.

Phishing exercises

C.

Application of multiple end point anti-malware solutions

D.

Blocking use of wireless networks

Questions # 39:

Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?

Options:

A.

Incident response plan

B.

Business Continuity plan

C.

Disaster recovery plan

D.

Damage control plan

Questions # 40:

Which of the following are the triple constraints of project management?

Options:

A.

Time, quality, and scope

B.

Cost, quality, and time

C.

Scope, time, and cost

D.

Quality, scope, and cost

Questions # 41:

A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?

Options:

A.

Compliance to the Payment Card Industry (PCI) regulations.

B.

Alignment with financial reporting regulations for each country where they operate.

C.

Alignment with International Organization for Standardization (ISO) standards.

D.

Compliance with patient data protection regulations for each country where they operate.

Questions # 42:

Which of the following most commonly falls within the scope of an information security governance steering committee?

Options:

A.

Approving access to critical financial systems

B.

Developing content for security awareness programs

C.

Interviewing candidates for information security specialist positions

D.

Vetting information security policies

Questions # 43:

Who is responsible for verifying that audit directives are implemented?

Options:

A.

IT Management

B.

Internal Audit

C.

IT Security

D.

BOD Audit Committee

Questions # 44:

If your organization operates under a model of "assumption of breach", you should:

Options:

A.

Protect all information resource assets equally

B.

Establish active firewall monitoring protocols

C.

Purchase insurance for your compliance liability

D.

Focus your security efforts on high value assets

Questions # 45:

Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?

Options:

A.

Vulnerability management

B.

Metrics and results enforcement

C.

Vendor management

D.

Security program governance

Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions