ECCouncil 712-50 - EC-Council Certified CISO (CCISO)
What is a Statement of Objectives (SOA)?
Many successful cyber-attacks currently include:
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
Who should be involved in the development of an internal campaign to address email phishing?
Who is responsible for verifying that audit directives are implemented?
What is the purpose of the statement of retained earnings of an organization?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
Security related breaches are assessed and contained through which of the following?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Which of the following is the MAIN security concern for public cloud computing?