ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
Which control is used to discourage the exploitation of a vulnerability or system?
Risk appetite is typically determined by which of the following organizational functions?
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.
Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?
A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?
What can you do to assist with law enforcement investigations if someone on your guest wireless network is suspected of committing an illegal act using your network?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
Which of the following is the MOST effective method to counter phishing attacks?
Which of the following is the MOST important component of any change management process?
Which of the following is an industry-agnostic information security control framework?
A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?
What is protected by Federal Information Processing Standards (FIPS) 140-2?
Which of the following is the MOST important action of an Information Security Steering Committee?
The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:
What is the MOST effective approach to gaining business unit approval of security controls within an organization?
