A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
The process of creating a system which divides documents based on their security level to manage access to private data is known as
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Which of the following are primary concerns for management with regard to assessing internal control objectives?
Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.
However, authorization failures can occur with individuals who have?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
When managing the critical path of an IT security project, which of the following is MOST important?
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
Which of the following represents the BEST method of ensuring security program alignment to business needs?
Which of the following is critical in creating a security program aligned with an organization’s goals?
Which of the following most commonly falls within the scope of an information security governance steering committee?
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
In defining a strategic security plan for an organization, what should a CISO first analyze?
The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units. Which of the following standards and guidelines can BEST address this organization’s need?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of
What oversight should the information security team have in the change management process for application security?
The primary responsibility for assigning entitlements to a network share lies with which role?
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?
A missing/ineffective security control is identified. Which of the following should be the NEXT step?
You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?
What type of attack requires the least amount of technical equipment and has the highest success rate?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?
To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?
In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?
The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?
Control Objectives for Information and Related Technology (COBIT) is which of the following?
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s
Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
During a cyber incident, which non-security personnel might be needed to assist the security team?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
CCISO | 712-50 Questions Answers | 712-50 Test Prep | EC-Council Certified CISO (CCISO) Questions PDF | 712-50 Online Exam | 712-50 Practice Test | 712-50 PDF | 712-50 Test Questions | 712-50 Study Material | 712-50 Exam Preparation | 712-50 Valid Dumps | 712-50 Real Questions | CCISO 712-50 Exam Questions