Winter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free 712-50 ECCouncil Updates

Page: 33 / 48
Total 494 questions

EC-Council Certified CISO (CCISO) Questions and Answers

Question 129

Dataflow diagrams are used by IT auditors to:

Options:

A.

Order data hierarchically.

B.

Highlight high-level data definitions.

C.

Graphically summarize data paths and storage processes.

D.

Portray step-by-step details of data generation.

Question 130

When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?

Options:

A.

Configurations and software patch level

B.

Unallocated system storage and removable drives

C.

Persistent and volatile data

D.

Screen captures and keystroke logs

Question 131

What standard provides a framework for information security risk management within organizations?

Options:

A.

Information Security Management System (ISMS)

B.

Control Objectives for Information and Related Technology (COBIT)

C.

National Institute of Standards and Technology (NIST)

D.

International Organization for Standardization (ISO) 27005

Question 132

Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.

You have identified potential solutions for all of your risks that do not have security controls. What is the NEXT step?

Options:

A.

Get approval from the board of directors

B.

Screen potential vendor solutions

C.

Verify that the cost of mitigation is less than the risk

D.

Create a risk metrics for all unmitigated risks

Page: 33 / 48
Total 494 questions