ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
What is the BEST reason for having a formal request for proposal process?
During a cyber incident, which non-security personnel might be needed to assist the security team?
Which of the following metrics would be MOST effective for measuring the effectiveness of a newly implemented change control process?
John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?
What is a critical initial step when creating a Business Continuity Plan (BCP)?
In order to improve situational awareness, there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which of the following tools represents the BEST choice to achieve this awareness?
Which of the following terms is used to describe the unexpected expansion of project deliverables?
What is the MAIN responsibility of the purple security testing team?
What is used to measure the effectiveness of an audit?
Which of the following best describes a portfolio?
What is the first thing that needs to be completed in order to create a security program for your organization?
You assess the corporate culture and determine there is a pervasive opinion that the security program limits business performance. What is the MOST effective approach to reshape corporate culture to adopt security as a norm?
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
Which of the following areas are beyond the duties of the CISO?
