Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 712-50 - EC-Council Certified CISO (CCISO)

Page: 9 / 13
Total 494 questions

The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to

A.

assign the responsibility to the information security team.

B.

assign the responsibility to the team responsible for the management of the controls.

C.

create operational reports on the effectiveness of the controls.

D.

perform an independent audit of the security controls.

As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with

third parties outside the organization. What protocol provides the ability to extend the network perimeter with

the use of encapsulation and encryption?

A.

File Transfer Protocol (FTP)

B.

Virtual Local Area Network (VLAN)

C.

Simple Mail Transfer Protocol

D.

Virtual Private Network (VPN)

Which of the following information may be found in table top exercises for incident response?

A.

Security budget augmentation

B.

Process improvements

C.

Real-time to remediate

D.

Security control selection

What is a difference from the list below between quantitative and qualitative Risk Assessment?

A.

Quantitative risk assessments result in an exact number (in monetary terms)

B.

Qualitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)

C.

Qualitative risk assessments map to business objectives

D.

Quantitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)

Which of the following are necessary to formulate responses to external audit findings?

A.

Internal Audit, Management, and Technical Staff

B.

Internal Audit, Budget Authority, Management

C.

Technical Staff, Budget Authority, Management

D.

Technical Staff, Internal Audit, Budget Authority

Which of the following is a symmetric encryption algorithm?

A.

3DES

B.

MD5

C.

ECC

D.

RSA

In what phase of an incident management process will malware antivirus signatures be distributed to infrastructure?

A.

Distribution

B.

Eradication

C.

Containment

D.

Collection

What does the acronym RACI stand for?

A.

Review, Act, Communicate, and Inform

B.

Responsible, Accountable, Consulted, and Informed

C.

Responsible, Authorized, Consulted, and Initiated

D.

Researched, Advised, Communicated, and Implemented

Which of the following provides enterprise security-based standards and best practices?

A.

NIST Special Publication 800-53

B.

International Organization for Standardization (ISO) 23009

C.

Payment Card Industry Data Security Standard (PCI DSS)

D.

Health Insurance Portability and Accountability Act (HIPAA)

Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.

However, authorization failures can occur with individuals who have?

A.

Glaucoma or cataracts

B.

Two different colored eyes (heterochromia iridium)

C.

Contact lens

D.

Malaria

Which of the following is a benefit of information security governance?

A.

Questioning the trust in vendor relationships.

B.

Increasing the risk of decisions based on incomplete management information.

C.

Direct involvement of senior management in developing control processes

D.

Reduction of the potential for civil and legal liability

While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?

A.

it is not effective for smaller investments

B.

It is not accepted by many accounting rules

C.

lt is the least precise

D.

positive result is an indication that the effort should be pursued

What is the last step in the system authorization process?

A.

Connecting the systems to an Internet Service Provider (ISP) for verification

B.

Getting authority to operate the system from executive management

C.

Changing the default passwords within all affected systems

D.

Conducting a final scan of the production system and mitigating all high-level vulnerabilities

Which of the following strategies provides the BEST response to a ransomware attack?

A.

Real-time off-site replication

B.

Daily incremental backup

C.

Daily full backup

D.

Daily differential backup

What is the MAIN reason for conflicts between Information Technology and Information Security programs?

A.

Technology governance defines technology policies and standards while security governance does not.

B.

Security governance defines technology best practices and Information Technology governance does not.

C.

Technology Governance is focused on process risks whereas Security Governance is focused on business risk.

D.

The effective implementation of security controls can be viewed as an inhibitor to rapid Information Technology implementations.