Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 712-50 - EC-Council Certified CISO (CCISO)

Page: 6 / 13
Total 494 questions

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and

uses the special card in order to access the restricted area of the target company. Just as the employee opens

the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so

that he can enter. What is the best way to undermine the social engineering activity of tailgating?

A.

Post a sign that states, “no tailgating” next to the special card reader adjacent to the secure door

B.

Issue special cards to access secure doors at the company and provide a one-time only brief description ofuse of the special card

C.

Educate and enforce physical security policies of the company to all the employees on a regular basis

D.

Setup a mock video camera next to the special card reader adjacent to the secure door

What is the BEST reason for having a formal request for proposal process?

A.

Creates a timeline for purchasing and budgeting

B.

Allows small companies to compete with larger companies

C.

Clearly identifies risks and benefits before funding is spent

D.

Informs suppliers a company is going to make a purchase

During a cyber incident, which non-security personnel might be needed to assist the security team?

A.

Threat analyst, IT auditor, forensic analyst

B.

Network engineer, help desk technician, system administrator

C.

CIO, CFO, CSO

D.

Financial analyst, payroll clerk, HR manager

Which of the following metrics would be MOST effective for measuring the effectiveness of a newly implemented change control process?

A.

Total unrequested changes

B.

Unplanned system outage trends

C.

Duration of planned outages

D.

Monthly count of rejected change requests

John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?

A.

Refer the vendor to the Service Level Agreement (SLA) and insist that they make the changes.

B.

Review the Request for Proposal (RFP) for guidance.

C.

Withhold the vendor’s payments until the issue is resolved.

D.

Refer to the contract agreement for direction.

What is a critical initial step when creating a Business Continuity Plan (BCP)?

A.

Conduct a full risk assessment on all business operations and technologies

B.

Create multiple layers of process steps

C.

Conduct a Business Impact Analysis (BIA)

D.

Define accurate Recovery Point Objectives (RPOs) and regularly test them

In order to improve situational awareness, there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which of the following tools represents the BEST choice to achieve this awareness?

A.

Security Information and Event Management (SIEM), Intrusion Prevention Systems (IPS), routers, and server alerts

B.

Intrusion Detection Systems (IDS), firewalls, switches, and system compliance tools

C.

Virtualized servers, routers, firewalls, and system logs

D.

Security Information and Event Management (SIEM), Intrusion Detection Systems (IDS), firewalls, and Vulnerability Management Systems (VMS)

Which of the following terms is used to describe the unexpected expansion of project deliverables?

A.

Vendor management

B.

Scope compression

C.

Scope creep

D.

Results management

What is the MAIN responsibility of the purple security testing team?

A.

They emulate hackers to compromise systems

B.

The integrate the defensive Indies and controls from the Blue Team with the threats and vulnerabilities found by the Red Team

C.

They defend against simulated hacker attacks

D.

They oversee security testing and results

What is used to measure the effectiveness of an audit?

A.

How it exposes the risk appetite of the company

B.

How the recommendations directly support the goals of the company

C.

The number of actionable items in the recommendations

D.

The number of security controls the company uses

Which of the following best describes a portfolio?

A.

The portfolio is used to manage and track individual projects

B.

The portfolio is used to manage incidents and events

C.

A portfolio typically consists of several programs

D.

A portfolio delivers one specific service or program to the business

What is the first thing that needs to be completed in order to create a security program for your organization?

A.

Risk assessment

B.

Security program budget

C.

Business continuity plan

D.

Compliance and regulatory analysis

You assess the corporate culture and determine there is a pervasive opinion that the security program limits business performance. What is the MOST effective approach to reshape corporate culture to adopt security as a norm?

A.

Cite corporate policy and collaborate with individuals to review audit reports

B.

Explain how other similar organizations have been compromised

C.

Understand the business and focus your efforts on enabling operations securely

D.

Communicate compliance requirements and financial penalties

When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?

A.

Daily

B.

Hourly

C.

Weekly

D.

Monthly

Which of the following areas are beyond the duties of the CISO?

A.

IT security compliance

B.

lnformation Technology (IT) portfolio management

C.

Network monitoring

D.

Cybersecurity policy