Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 712-50 - EC-Council Certified CISO (CCISO)

Page: 2 / 15
Total 494 questions

A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:

A.

Inability to export the private certificate/key

B.

It can double as physical identification at the DMV

C.

It has the user’s photograph to help ID them

D.

It can be used as a secure flash drive

Which of the following areas are beyond the duties of the CISO?

A.

IT security compliance

B.

lnformation Technology (IT) portfolio management

C.

Network monitoring

D.

Cybersecurity policy

Many successful cyber-attacks currently include:

A.

Phishing Attacks

B.

Misconfigurations

C.

All of these

D.

Social engineering

The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.

Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?

A.

The project is over budget

B.

The project budget has reserves

C.

The project cost is in alignment with the budget

D.

The project is under budget

Which publication serves as a resource of enterprise security-based standards and BEST practices?

A.

NIS Standard Publication 800-53 R5

B.

HIPAA

C.

ISO 27004

D.

PCI DSS

Devising controls for information security is a balance between?

A.

Governance and compliance

B.

Auditing and security

C.

Budget and risk tolerance

D.

Threats and vulnerabilities

While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?

A.

it is not effective for smaller investments

B.

It is not accepted by many accounting rules

C.

lt is the least precise

D.

positive result is an indication that the effort should be pursued

You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?

A.

Payment Card Industry (PCI) Data Security Standard (DSS)

B.

ISO 27002

C.

NIST Cybersecurity Framework

D.

The Federal Risk and Authorization Management Program (FedRAMP)

Which of the following is considered the MOST effective tool against social engineering?

A.

Anti-phishing tools

B.

Effective Security awareness program

C.

Anti-malware tools

D.

Effective Security Vulnerability Management Program

What is a key goal of information security?

A.

Creation of controls and processes to security the organization's data and information resources

B.

The documentation and qualification of risk be the organization to facilitate better decision making by management

C.

The confidentiality, integrity, and availability of the organization s data and information resources

D.

to reduce adverse impacts on the organization to an acceptable level of risk