ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the "real workers." Which group of people should be consulted when developing your security program?

A.
Peers
A.
Peers
Answers
B.
End Users
B.
End Users
Answers
C.
Executive Management
C.
Executive Management
Answers
D.
All of the above
D.
All of the above
Answers
Suggested answer: D

Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agend a.

The CISO has been able to implement a number of technical controls and is able to influence the Information Technology teams but has not been able to influence the rest of the organization. From an organizational perspective, which of the following is the LIKELY reason for this?

A.
The CISO does not report directly to the CEO of the organization
A.
The CISO does not report directly to the CEO of the organization
Answers
B.
The CISO reports to the IT organization
B.
The CISO reports to the IT organization
Answers
C.
The CISO has not implemented a policy management framework
C.
The CISO has not implemented a policy management framework
Answers
D.
The CISO has not implemented a security awareness program
D.
The CISO has not implemented a security awareness program
Answers
Suggested answer: B

Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.

Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?

A.
Lack of identification of technology stake holders
A.
Lack of identification of technology stake holders
Answers
B.
Lack of business continuity process
B.
Lack of business continuity process
Answers
C.
Lack of influence with leaders outside IT
C.
Lack of influence with leaders outside IT
Answers
D.
Lack of a security awareness program
D.
Lack of a security awareness program
Answers
Suggested answer: C

Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.

From an Information Security Leadership perspective, which of the following is a MAJOR concern about the CISO's approach to security?

A.
Lack of risk management process
A.
Lack of risk management process
Answers
B.
Lack of sponsorship from executive management
B.
Lack of sponsorship from executive management
Answers
C.
IT security centric agenda
C.
IT security centric agenda
Answers
D.
Compliance centric agenda
D.
Compliance centric agenda
Answers
Suggested answer: C

Explanation:

Scenario9

Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.

Using the best business practices for project management, you determine that the project correctly aligns with the organization goals. What should be verified next?

A.
Scope
A.
Scope
Answers
B.
Budget
B.
Budget
Answers
C.
Resources
C.
Resources
Answers
D.
Constraints
D.
Constraints
Answers
Suggested answer: A

Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.

Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?

A.
Upper management support
A.
Upper management support
Answers
B.
More frequent project milestone meetings
B.
More frequent project milestone meetings
Answers
C.
More training of staff members
C.
More training of staff members
Answers
D.
Involve internal audit
D.
Involve internal audit
Answers
Suggested answer: A

Explanation:

Scenario10

You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.

Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?

A.
Scope of the project
A.
Scope of the project
Answers
B.
Training of the personnel on the project
B.
Training of the personnel on the project
Answers
C.
Timeline of the project milestones
C.
Timeline of the project milestones
Answers
D.
Vendor for the project
D.
Vendor for the project
Answers
Suggested answer: A

You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.

Using the best business practices for project management you determine that the project correctly aligns with the company goals and the scope of the project is correct. What is the NEXT step?

A.
Review time schedules
A.
Review time schedules
Answers
B.
Verify budget
B.
Verify budget
Answers
C.
Verify resources
C.
Verify resources
Answers
D.
Verify constraints
D.
Verify constraints
Answers
Suggested answer: C

The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.

Which of the following needs to be performed NEXT?

A.
Verify the scope of the project
A.
Verify the scope of the project
Answers
B.
Verify the regulatory requirements
B.
Verify the regulatory requirements
Answers
C.
Verify technical resources
C.
Verify technical resources
Answers
D.
Verify capacity constraints
D.
Verify capacity constraints
Answers
Suggested answer: A

Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.

What action should you take FIRST?

A.
Destroy the repository of stolen data
A.
Destroy the repository of stolen data
Answers
B.
Contact your local law enforcement agency
B.
Contact your local law enforcement agency
Answers
C.
Consult with other C-Level executives to develop an action plan
C.
Consult with other C-Level executives to develop an action plan
Answers
D.
Contract with a credit reporting company for paid monitoring services for affected customers
D.
Contract with a credit reporting company for paid monitoring services for affected customers
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46