Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?
Answer : C
Focus on Relevant Metrics:
The Board of Directors (BOD) requires concise, impactful information that demonstrates the organization's security posture. Metrics should highlight risks that directly affect critical business operations.
Presentation Strategy:
Highlighting only critical and high vulnerabilities on production servers ensures the BOD understands the urgency and importance of these vulnerabilities without overwhelming them with irrelevant details.
Supporting Reference:
CCISO materials emphasize presenting risk-based metrics that align with organizational priorities to effectively communicate with executive leadership.
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
Answer : A
Distance learning and web seminars are cost-effective training methods as they eliminate travel, venue, and material costs while allowing scalability to train multiple individuals simultaneously.
These methods also offer flexibility for learners, reducing productivity loss during training.
Why Other Options Are Less Cost-Effective:
B . Formal class: Involves significant costs for instructors, venues, and travel.
C . One-on-one training: Highly personalized but not cost-effective due to time and resource demands.
D . Self-study (noncomputerized): May have minimal costs but lacks scalability and standardization.
EC-Council CISO Reference: Cost-effective training solutions are emphasized as critical for maintaining skills while managing organizational budgets effectively.
Topic 4, Information Security Core Competencies
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
Answer : B
Contracting with a managed security service provider (MSSP) offers 24/7 monitoring and incident detection capabilities without adding full-time staff.
Current staff can remain on-call for critical incident response, ensuring coverage without increasing headcount.
Why Other Options Are Incorrect:
A . Deploy a SEIM solution: While useful, a SEIM requires constant monitoring to be effective. Simply reviewing incidents in the morning is insufficient.
C . Configure syslog to send SMS messages: This approach lacks comprehensive monitoring and is reactive rather than proactive.
D . Employ an assumption of breach protocol: This does not address the need for consistent monitoring and is not a direct solution to coverage gaps.
EC-Council CISO Reference: The program highlights the value of MSSPs in enhancing organizational security capabilities while managing costs.
=========================
The rate of change in technology increases the importance of:
Answer : D
Importance of Processes Amid Technological Change
The rapid rate of technological innovation necessitates robust processes to adapt to emerging threats, compliance requirements, and operational changes.
Why Processes Are Critical
They ensure consistency, accountability, and efficiency in managing IT environments and security.
Good processes outlast changes in technology and personnel.
Comparison of Options
A . Outsourcing IT functions: May mitigate short-term challenges but doesn't address foundational needs.
B . Understanding user requirements: Important but secondary to enforcing processes.
C . Hiring personnel with leading-edge skills: Useful but insufficient without good processes.
EC-Council Reference
EC-Council emphasizes the importance of process standardization (e.g., NIST CSF, ISO 27001) for sustained resilience.
Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
Answer : B
The total cost of security controls should:
Answer : C
The total cost of security controls must always be less than the value of the protected asset, ensuring cost-effectiveness in resource allocation.
Economic Principle of Security:
Spending more to protect an asset than its value undermines the financial justification for security.
Cost-Benefit Consideration:
Security investments should provide value greater than their cost by reducing potential losses and improving operational resilience.
Relevance of Other Options:
Equal to Value: Break-even point but not cost-efficient.
Greater than Value: Leads to inefficiencies.
Should Not Matter: Contradicts sound financial practices.
EC-Council CISO Reference:
Economic Feasibility of Security Measures: Discusses balancing security costs with asset value.
Risk-Driven Decision Making: Guides the alignment of resource allocation with organizational goals and asset value.
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
Answer : C
Purpose of After-Hours Security Checks: Regular inspections for security violations demonstrate adherence to established security policies and procedures, ensuring compliance across the organization.
Why This Demonstrates Compliance Management:
Ensures that employees follow policies, such as securing files and logging out of active sessions.
Highlights the organization's commitment to enforcing security measures.
Why Other Options Are Incorrect:
A . Audit Validation: Focuses on verifying the accuracy of records and processes, not physical security checks.
B . Physical Control Testing: Involves testing physical security mechanisms (e.g., locks, barriers).
D . Security Awareness Training: Refers to educating employees, not monitoring compliance.
Reference: EC-Council defines compliance management as ensuring rules and policies are followed consistently, which is demonstrated in this scenario.