Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 712-50 - EC-Council Certified CISO (CCISO)

Page: 1 / 15
Total 494 questions

The governing body that defines best practices for the collection of digital evidence is the:

A.

European Union (EU)

B.

National Institute of Standards and Technology (NI5T)

C.

Scientific Working Croup on Digital evidence (5WGDE)

D.

department of Defense (DoD)

Which security technologies are MOST critical to implementing a zero trust model?

A.

Firewalls, IPS, WAF

B.

DLP, SIFM, IP5

C.

ACLs, secure gateways, IPS

D.

MFA, IAM, Endpoint Security

When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:

A.

Patch management

B.

Network monitoring

C.

Ability to provide security services tailored to the business’ needs

D.

24/7 tollfree number

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

A.

Trusted and untrusted networks

B.

Type of authentication

C.

Storage encryption

D.

Log retention

Which of the following is the MAIN security concern for public cloud computing?

A.

Unable to control physical access to the servers

B.

Unable to track log on activity

C.

Unable to run anti-virus scans

D.

Unable to patch systems as needed

Who is PRIMARILY responsible for declaring a disaster and initiating processes to facilitate the recovery of critical assets in an organization?

A.

Business Continuity Manager

B.

Board of Directors

C.

Chief Executive Officer (CEO)

D.

CISO

What is a key policy that should be part of the information security plan?

A.

Account management policy

B.

Training policy

C.

Acceptable Use policy

D.

Remote Access policy

What Enterprise Architecture Framework is business-centric and is composed of eight phases?

A.

Federal Enterprise Architecture

B.

The Open Group Architecture Framework (TOGAF)

C.

Zochman

D.

Sherwood Applied Business Security Architecture

Which of the following BEST mitigates ransomware threats?

A.

Phishing exercises

B.

Use immutable data storage

C.

Blocking use of wireless networks

D.

Application of multiple endpoint anti-malware solutions

Many successful cyber-attacks currently include:

A.

Phishing Attacks

B.

Misconfigurations

C.

Social engineering

D.

All of these