ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?
When creating contractual agreements and procurement processes why should security requirements be included?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
Which publication serves as a resource of enterprise security-based standards and BEST practices?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
What action should you take FIRST?
What does a security control objective provide for auditors?
Your company has a “no right to privacy†notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):
Why is it vitally important that senior management endorse a security policy?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?
When assessing internal control objectives, what are the auditor's PRIMARY concerns?
What oversight should the information security team have in the change management process for application security?
