Get Full Version of the Exam
http://www.EnsurePass.com/712-50.html
Question No.141
You are the Chief Information Security Officer of a large, multinational bank and you suspect
there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
-
Validate that security awareness program content includes information about the potential vulnerability
-
Conduct a thorough risk assessment against the current implementation to determine system functions
-
Determine program ownership to implement compensating controls
-
Send a report to executive peers and business unit owners detailing your suspicions
Correct Answer: B
Question No.142
Which International Organization for Standardization (ISO) below BEST describes the performance of risk management, and includes a five-stage risk management methodology?
-
ISO 27001
-
ISO 27002
-
ISO 27004
-
ISO 27005
Correct Answer: D
Question No.143
With respect to the audit management process, management response serves what function?
-
placing underperforming units on notice for failing to meet standards
-
determining whether or not resources will be allocated to remediate a finding
-
adding controls to ensure that proper oversight is achieved by management
-
revealing the quot;root causequot; of the process failure and mitigating for all internal and external units
Correct Answer: B
Question No.144
A Chief Information Security Officer received a list of high, medium, and low impact audit findings. Which of the following represents the BEST course of action?
-
If the findings impact regulatory compliance, try to apply remediation that will address the most findings for the least cost.
-
If the findings do not impact regulatory compliance, remediate only the high and medium risk findings.
-
If the findings impact regulatory compliance, remediate the high findings as quickly as possible.
-
If the findings do not impact regulatory compliance, review current security controls.
Correct Answer: C
Question No.145
During the course of a risk analysis your IT auditor identified threats and potential impacts. Next, your IT auditor should:
-
Identify and evaluate the existing controls.
-
Disclose the threats and impacts to management.
-
Identify information assets and the underlying systems.
-
Identify and assess the risk assessment process used by management.
Correct Answer: A
Question No.146
An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:
-
Inform senior management of the risk involved.
-
Agree to work with the security officer on these shifts as a form of preventative control.
-
Develop a computer assisted audit technique to detect instances of abuses of the arrangement.
-
Review the system log for each of the late night shifts to determine whether any irregular actions occurred.
Correct Answer: A
Question No.147
Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?
-
Servers, routers, switches, modem
-
Firewall, exchange, web server, intrusion detection system (IDS)
-
Firewall, anti-virus console, IDS, syslog
-
IDS, syslog, router, switches
Correct Answer: C
Question No.148
The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team. This is consider a bad practice MAINLY because
-
The IT team is not familiar in IT audit practices
-
This represents a bad implementation of the Least Privilege principle
-
This represents a conflict of interest
-
The IT team is not certified to perform audits
Correct Answer: C
Question No.149
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
-
Control Objective for Information Technology (COBIT)
-
Committee of Sponsoring Organizations (COSO)
-
Payment Card Industry (PCI)
-
Information Technology Infrastructure Library (ITIL)
Correct Answer: A
Question No.150
How often should an environment be monitored for cyber threats, risks, and exposures?
-
Weekly
-
Monthly
-
Quarterly
-
Daily
Correct Answer: D
Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF