ECCouncil 712-50 Practice Test - Questions Answers, Page 15
List of questions
Related questions
An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
The effectiveness of an audit is measured by?
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
You have implemented the new controls. What is the next step?
An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the
NEXT step?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
Question