ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
Which of the following provides an audit framework?
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
What process is used to identify and collect information to support legal requests?
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Which of the following industry / sector neutral information security control frameworks should you recommend for implementation?
Which of the following would BEST provide a comprehensive, independent, and certifiable perspective of security controls in an environment?
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
What is the definition of Risk in Information Security?
How often should an environment be monitored for cyber threats, risks, and exposures?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
What is a Statement of Objectives (SOA)?
Which of the following is MOST effective when mitigating social engineering risks?
A Security Operations Center (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen, and the database server was disconnected. Who must be informed of this incident?
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
