Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 712-50 - EC-Council Certified CISO (CCISO)

Page: 8 / 13
Total 494 questions

Which control is used to discourage the exploitation of a vulnerability or system?

A.

Preventive

B.

Corrective

C.

Detective

D.

Deterrent

Risk appetite is typically determined by which of the following organizational functions?

A.

Security

B.

Business units

C.

Board of Directors

D.

Audit and compliance

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

A.

Audit and Legal

B.

Budget and Compliance

C.

Human Resources and Budget

D.

Legal and Human Resources

The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.

Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?

A.

The project is over budget

B.

The project budget has reserves

C.

The project cost is in alignment with the budget

D.

The project is under budget

A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?

A.

Information Technology Infrastructure Library (ITIL)

B.

International Organization for Standardization (ISO) standards

C.

Payment Card Industry Data Security Standards (PCI-DSS)

D.

National Institute for Standards and Technology (NIST) standard

What can you do to assist with law enforcement investigations if someone on your guest wireless network is suspected of committing an illegal act using your network?

A.

Provide logging and analysis for all access points

B.

Disable SSID broadcast and enable address filtering on access points

C.

Install firewall software on all access points

D.

Provide the IP address, MAC address, and other pertinent information

Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.

What is one proven method to account for common elements found within separate regulations and/or standards?

A.

Hire a GRC expert

B.

Use the Find function of your word processor

C.

Design your program to meet the strictest government standards

D.

Develop a crosswalk

Which of the following is the MOST effective method to counter phishing attacks?

A.

User awareness and training

B.

Host based Intrusion Detection System (IPS)

C.

Acceptable use guide signed by all system users

D.

Antispam solution

Which of the following is the MOST important component of any change management process?

A.

Scheduling

B.

Back-out procedures

C.

Outage planning

D.

Management approval

Which of the following is an industry-agnostic information security control framework?

A.

Payment Card Industry Data Security Standard (PCI DSS)

B.

International Organization for Standardization ISO/IEC 27001

C.

International Organization for Standardization ISO 27005

D.

Health Insurance Portability and Accountability Act (HIPAA)

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?

A.

A security organization that is adequately staffed to apply required mitigation strategies and regulatory compliance solutions

B.

A clear set of security policies and procedures that are more concept-based than controls-based

C.

A complete inventory of Information Technology assets including infrastructure, networks, applications and data

D.

A clearly identified executive sponsor who will champion the effort to ensure organizational buy-in

What is protected by Federal Information Processing Standards (FIPS) 140-2?

A.

Integrity

B.

Confidentiality

C.

Non-repudiation

D.

Availability

Which of the following is the MOST important action of an Information Security Steering Committee?

A.

Be briefed about new trends and products by a vendor

B.

Ensure the committee includes members from different departments and employee levels

C.

Ensure that security policies and procedures have been approved by the Board of Directors

D.

Review of current audit and compliance reports

The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:

A.

Safeguard Value

B.

Cost Benefit Analysis

C.

Single Loss Expectancy

D.

Life Cycle Loss Expectancy

What is the MOST effective approach to gaining business unit approval of security controls within an organization?

A.

Create separate controls and technologies for business units

B.

Create control mandates and schedules of audits for business compliance validation

C.

Collaborate with business units to define conditions under which controls must be applied

D.

Allow business units to decide which controls apply to their systems