ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
What is the primary reason for performing vendor management?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
What type of control is being implemented by supervisors and data owners?
When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?
What are the four groups that are critical to the success of evaluating and approving contracts during the negotiation phase?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
What does an anonymous network consist of as the PRIMARY supporting components?
Which type of physical security control scan a person’s external features through a digital video camera before
granting access to a restricted area?
Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
What standard would you use to help determine key performance indicators?
During an audit, what should the auditor do after identifying threats and potential impact?
The primary purpose of a risk register is to:
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?
Who is responsible for oversight of an information security program within an organization?
Who is responsible for securing networks during a security incident?
