Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 712-50 - EC-Council Certified CISO (CCISO)

Page: 11 / 13
Total 494 questions

What key technology can mitigate ransomware threats?

A.

Use immutable data storage

B.

Phishing exercises

C.

Application of multiple end point anti-malware solutions

D.

Blocking use of wireless networks

Which of the following illustrates an operational control?

A.

Conducting weekly audits of configuration management processes

B.

Establishing procurement guidelines for vendors

C.

Classifying an information system as part of a document assessment

D.

Installing a fire suppression system in a data center

An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?

A.

Time zone differences

B.

Compliance to local hiring laws

C.

Encryption import/export regulations

D.

Local customer privacy laws

Risk transference is BEST represented by which of the following actions?

A.

Communicating the risk to all business units

B.

Outsourcing data storage operations to a third party

C.

Procuring cyber insurance

D.

Changing current processes for data retention

According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?

A.

Susceptibility to attack, mitigation response time, and cost

B.

Attack vectors, controls cost, and investigation staffing needs

C.

Vulnerability exploitation, attack recovery, and mean time to repair

D.

Susceptibility to attack, expected duration of attack, and mitigation availability

Which business stakeholder is accountable for the integrity of a new information system?

A.

CISO

B.

Compliance Officer

C.

Project manager

D.

Board of directors

What framework of rules and practices is used by a Board of Directors to provide accountability, fairness, and transparency in the organization’s interactions with its shareholders?

A.

Risk management

B.

Stock performance

C.

Corporate governance

D.

Audit oversight

To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?

A.

Compliance management

B.

Asset management

C.

Risk management

D.

Security management

Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.

To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?

A.

Business Impact Analysis

B.

Business Continuity plan

C.

Security roadmap

D.

Annual report to shareholders

Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?

A.

Vulnerability management

B.

Metrics and results enforcement

C.

Vendor management

D.

Security program governance

Which of the following BEST mitigates ransomware threats?

A.

Phishing exercises

B.

Use immutable data storage

C.

Blocking use of wireless networks

D.

Application of multiple endpoint anti-malware solutions

The ability to require implementation and management of security controls within third-party provided services is a critical part of:

A.

Disaster recovery

B.

Vendor management

C.

Security Governance

D.

Compliance management

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.

What is the MOST logical course of action the CISO should take?

A.

Review the original solution set to determine if another system would fit the organization’s risk appetite and budgetregulatory compliance requirements

B.

Continue with the implementation and submit change requests to the vendor in order to ensure required functionality will be provided when needed

C.

Continue with the project until the scalability issue is validated by others, such as an auditor or third party assessor

D.

Cancel the project if the business need was based on internal requirements versus regulatory compliance requirements

What type of test is performed by an auditor when a sample of programs is selected to determine if software source and object versions are the same?

A.

A sample test of program library features

B.

A sample test of programming object reuse controls

C.

A compliance test of program compiler operations

D.

A compliance test of program library controls

Payment Card Industry (PCI) compliance requirements are based on what criteria?

A.

The types of cardholder data retained

B.

The duration card holder data is retained

C.

The size of the organization processing credit card data

D.

The number of transactions performed per year by an organization