When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
Which of the following is the MOST important reason for performing assessments of the security portfolio?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
An organization correctly configured a Data Loss Prevention (DLP) technology. Afterward, sensitive data was found on public websites. What is the MOST likely reason for this situation?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
What is the MOST important result of the management response within the audit process?
A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?
The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.
Which of the following needs to be performed NEXT?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
You have identified potential solutions for all of your risks that do not have security controls. What is the NEXT step?
Acceptable levels of information security risk tolerance in an organization should be determined by?
Which of the following refers to the quantity or quality of project deliverables expanding from the original project plan?
Which control is used to discourage the exploitation of a vulnerability or system?
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
What is the estimate of all direct and indirect costs associated with an asset or acquisition over its entire life cycle?
Which of the following is a countermeasure to prevent unauthorized database access from Web applications?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
What type of control is used when assigning information assurance requirements to an independent security group?
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your employer?
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Which of the following activities must be completed BEFORE you can calculate risk?
What is the first thing that needs to be completed in order to create a security program for your organization?
A recent audit has identified control exceptions and recommends implementing technology and processes to remediate the finding. Which of the following is the MOST likely reason for the organization to reject the recommendation?
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
What is the purpose of International Organization for Standardization (ISO) 27002?
The executive board has requested that the CISO define Key Performance Indicators (KPIs) to measure the effectiveness of the security awareness program. Which information would be MOST useful?
During an initial investigation, the Incident Response Team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical action they should take?
Which of the following would be used to measure the effectiveness of an Information Security Management System (ISMS)?
A missing/ineffective security control is identified. Which of the following should be the NEXT step?
What is the MOST probable explanation for a security policy that is often ignored and unenforced?
Which of the following provides enterprise security-based standards and best practices?
Which of the following controls is MOST critical for protecting Artificial Intelligence (AI) systems?
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
The single most important consideration to make when developing your security program, policies, and processes is:
When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
Which of the following terms is used to describe the estimate of all direct and indirect costs associated with an asset or acquisition over its entire life cycle?
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
The formal certification and accreditation process has four primary steps, what are they?
Which of the following best describes an access control process that confirms the identity of the entity seeking
access to a logical or physical area?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
In the event of a cybersecurity breach within a publicly traded company, who bears the ultimate responsibility to the shareholders?
If a CISO wants to understand the liabilities of the company, she will refer to the:
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
Which of the following results would have the MOST significant negative effect on an organization's external market image?
Developing effective security controls is a balance between which of the following?
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
What is the MOST important reason to have senior leadership endorse security policies?
Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how
hardware and software is implemented and managed within the organization. Which of the following principles
does this best demonstrate?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
The Health Insurance Portability and Accountability Act (HIPAA) requires an agreement between Cloud Service Providers (CCSP) and the covered entity. Based on HIPAA. which document must be completed between the covered entity and the CCSP?
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?
Due to staff shortages during off-hours, the Security Operations Center (SOC) manager is considering outsourcing off-hour coverage. What type of SOC is being considered?
The primary responsibility for assigning entitlements to a network share lies with which role?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
What is a difference from the list below between quantitative and qualitative Risk Assessment?
A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?
When managing the critical path of an IT security project, which of the following is MOST important?
Providing oversight of an information security program for the organization is the primary responsibility of which group?
Which of the following is the MOST effective method for discovering common technical vulnerabilities within the
IT environment?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
Which of the following best describes the sensors designed to project and detect a light beam across an area?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
What is the MOST logical course of action the CISO should take?
Which of the following terms is used to describe the unexpected expansion of project deliverables?
If your organization operates under a model of "assumption of breach", you should:
What oversight should the information security team have in the change management process for application security?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
A Security Operations Manager is finding it difficult to maintain adequate staff levels to monitor security operations during off-hours. To reduce the impact of staff shortages and increase coverage during off-hours, the SecOps manager is considering outsourcing off-hour coverage.
What Security Operations Center (SOC) model does this BEST describe?
What cloud computing environment allows access and use by several organizations for information sharing?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
Which of the following information would MOST likely be reported at the board-level within an organization?
While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?
When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business,
they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they
will be in the organization. How would you prevent such type of attacks?
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
Creating a secondary authentication process for network access would be an example of?
Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.
Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?
When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?
Where does bottom-up financial planning primarily gain information for creating budgets?
Physical security measures typically include which of the following types of controls?
What is the BEST approach for managing shared elements from multiple regulations and standards?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO discovers the scalability issue will only impact a small number of network segments. What is the next logical step to ensure the proper application of risk management methodology within the two-facto implementation project?
What are the four groups that are critical to the success of evaluating and approving contracts during the negotiation phase?
Which business stakeholder is accountable for the integrity of a new security system within the Security Operations Center (SOC)?
Which of the following is an IT governance framework that allows managers to bridge the gap between control requirements, technical issues, and business risks?
The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?
Controls that were implemented to correct prior audit findings are insufficient. Before adjusting controls, what original document should be reviewed?
In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?
The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.
Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?
Which of the following is a benefit of a risk-based approach to audit planning?
Which of the following most commonly falls within the scope of an information security governance steering committee?
The alerting, monitoring and life-cycle management of security related events is typically handled by the
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
An organization is looking for a framework to measure the efficiency and effectiveness of their Information Security Management System. Which of the following international standards can BEST assist this organization?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
With respect to the audit management process, management response serves what function?
During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her
annual budget. What is the condition of her current budgetary posture?
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
Ciphertext is encrypted with the same key used by the recipient to decrypt it. What encryption method is being used?
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
When assessing internal control objectives, what are the auditor's PRIMARY concerns?
When analyzing and forecasting a capital expense budget what are not included?
What is the next step after defining the conditions under which standard security controls must be applied?
The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
Which of the following strategies provides the BEST response to a ransomware attack?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
Which of the following is MOST important when dealing with an Information Security Steering committee:
When analyzing and forecasting an operating expense budget what are not included?
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
Which control is used to discourage the exploitation of a vulnerability or system?
What term BEST describes assuring the actions of employees, applications, and systems follow the organization's rules and regulations?
During a cyber incident, which non-security personnel might be needed to assist the security team?
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
CCISO | 712-50 Questions Answers | 712-50 Test Prep | EC-Council Certified CISO (CCISO) Questions PDF | 712-50 Online Exam | 712-50 Practice Test | 712-50 PDF | 712-50 Test Questions | 712-50 Study Material | 712-50 Exam Preparation | 712-50 Valid Dumps | 712-50 Real Questions | CCISO 712-50 Exam Questions