ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
Which of the following is the BEST reason for CISO collaboration with legal, IT, and core business functions?
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
Which of the following is MOST important when dealing with an Information Security Steering committee:
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
With respect to the audit management process, management response serves what function?
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
Symmetric encryption in general is preferable to asymmetric encryption when:
Which of the following would be used to measure the effectiveness of an Information Security Management System (ISMS)?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When formulating the remediation plan, what is a required input?
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
Which of the following is the MOST important for a CISO to understand when identifying threats?
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
What is the main purpose of the Incident Response Team?
