ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
Which of the following is critical in creating a security program aligned with an organization’s goals?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
Regulatory requirements typically force organizations to implement
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
Which of the following is critical for maintaining a successful information security management program?
Due to staff shortages during off-hours, the Security Operations Center (SOC) manager is considering outsourcing off-hour coverage. What type of SOC is being considered?
The primary responsibility for assigning entitlements to a network share lies with which role?
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
Which of the following uses encapsulation and encryption?
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
What is meant by password aging?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement
