ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
What key technology can mitigate ransomware threats?
Which of the following illustrates an operational control?
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?
Risk transference is BEST represented by which of the following actions?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
Which business stakeholder is accountable for the integrity of a new information system?
What framework of rules and practices is used by a Board of Directors to provide accountability, fairness, and transparency in the organization’s interactions with its shareholders?
To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?
Which of the following BEST mitigates ransomware threats?
The ability to require implementation and management of security controls within third-party provided services is a critical part of:
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
What is the MOST logical course of action the CISO should take?
What type of test is performed by an auditor when a sample of programs is selected to determine if software source and object versions are the same?
Payment Card Industry (PCI) compliance requirements are based on what criteria?
