We at Crack4sure are committed to giving students who are preparing for the ECCouncil 712-50 Exam the most current and reliable questions . To help people study, we've made some of our EC-Council Certified CISO (CCISO) exam materials available for free to everyone. You can take the Free 712-50 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When adjusting the controls to mitigate the risks, how often should the CISO perform an audit to verify the controls?
An organization correctly configured a Data Loss Prevention (DLP) technology. Afterward, sensitive data was found on public websites. What is the MOST likely reason for this situation?
What is the MOST important result of the management response within the audit process?
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a
solution stopping people from entering certain restricted zones without proper credentials. Which of following
physical security measures should the administrator use?
What type of document defines the strategy, approach, and expectations within an organization?
Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?
Which of the following information may be found in table top exercises for incident response?
Which of the following is a benefit of a risk-based approach to audit planning?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
What are the three PRIMARY constraints of project management?
An example of professional unethical behavior is:
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s
What standard would you use to help determine key performance indicators?
When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?
What standard provides a framework for information security risk management?
As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?
Which of the following is the MOST critical step when establishing a security governance program?
When obtaining new products and services, why is it essential to collaborate with lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has implemented remediation activities. Which of the following is the MOST logical next step?
The ability to require implementation and management of security controls within third-party provided services is a critical part of:
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
Risk is defined as:
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
What standard provides a comprehensive framework for information security risk management within organizations?
Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?
Which of the following intellectual Property components is focused on maintaining brand recognition?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
Security related breaches are assessed and contained through which of the following?
Which of the following is critical in creating a security program aligned with an organization’s goals?
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?
Which organizational structure blends elements of functional and project organizational models to create a hybrid reporting structure?
Risk appetite directly affects what part of a vulnerability management program?
What process evaluates technical and non-technical security controls to validate that an implementation meets a specific set of security requirements?
A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
What would be the MOST likely reason a CISO sees abnormally high volumes of security exceptions within a number of business functions?
Which of the following would BEST provide a comprehensive, independent, and certifiable perspective of security controls in an environment?
A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.
What is the MAIN goal of threat hunting to the SecOps Manager?
Which of the following is MOST effective when mitigating social engineering risks?
The formal certification and accreditation process has four primary steps, what are they?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
A global retail company is creating a new compliance management process. Which of the following standards would be of PRIMARY importance?
Which of the following is the MOST important benefit of an effective security governance process?
What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?
An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
What is the purpose of International Organization for Standardization (ISO) 27002?
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
Which of the following is an accurate description of a balance sheet?
You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
When multiple regulations or standards apply to your industry you should set controls to meet the:
An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).
The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?
A digital signature addresses which of the following concerns?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
Who is responsible for verifying that audit directives are implemented?
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
Which of the following terms is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
Which of the following is critical for maintaining a successful information security management program?
Risk that remains after risk mitigation is known as
Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?
In what phase of an incident management process will malware antivirus signatures be distributed to infrastructure?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
If the result of an NPV is positive, then the project should be selected. The net present value shows the present
value of the project, based on the decisions taken for its selection. What is the net present value equal to?
Which of the following is a benefit of information security governance?
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
What is the first action taken when reacting to a malware attack?
Which of the following is an example of risk transference?
Which of the following is the MOST important result of a business-aligned security program?
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
Which of the following is an industry-agnostic information security control framework?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
Which of the following is MOST useful when developing a business case for security initiatives?
Which of the following strategies provides the BEST response to a ransomware attack?
Which of the following controls is MOST critical for protecting Artificial Intelligence (AI) systems?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
Annual Loss Expectancy is derived from the function of which two factors?
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When formulating the remediation plan, what is a required input?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?
What should an organization do to ensure that they have an effective Business Continuity Plan?
What is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?
A vendor delivering services refuses to make changes to work that is unsatisfactory and resulted in a failed quality test. Which of the following is the BEST course of action?
In which of the following examples would an organization be more willing to accept a risk instead of mitigating it?
The rate of change in technology increases the importance of:
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Which of the following is the MOST important reason for performing assessments of the security portfolio?
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
If a CISO wants to understand the liabilities of the company, she will refer to the:
Which of the following provides enterprise security-based standards and best practices?
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
Dataflow diagrams are used by IT auditors to:
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
Which of the following compliance standards is the MOST common among retail businesses?
An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.
What should the auditor’s NEXT step be?
The PRIMARY objective of security awareness is to:
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
What is the difference between a quantitative and qualitative risk assessment?
Which of the following best describes the sensors designed to project and detect a light beam across an area?
When would it be more desirable to develop a set of decentralized security policies and procedures within an enterprise environment?
The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team. This is consider a bad practice MAINLY because
The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?
When creating contractual agreements and procurement processes why should security requirements be included?
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
The organization wants a more permanent solution to the threat to user credential compromise through phishing. What technical solution would BEST address this issue?
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
Which control is used to discourage the exploitation of a vulnerability or system?
Which of the following results would have the MOST significant negative effect on an organization's external market image?
When developing the Business Impact Assessment (BIA), which of the following MOST closely relates to data backup and restoration?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how
hardware and software is implemented and managed within the organization. Which of the following principles
does this best demonstrate?
Which of the following most commonly falls within the scope of an information security governance steering committee?
What is the MOST likely detrimental consequence arising from an ineffective security governance program within a highly regulated organization?
What process is used to identify and collect information to support legal requests?
An organization's Information Security Policy is of MOST importance because
Which of the following would be the MOST concerning security audit finding?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.
Using the best business practices for project management, you determine that the project correctly aligns with the organization goals. What should be verified next?
Which of the following is MOST likely to be discretionary?
Which of the following is a symmetric encryption algorithm?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
Why would you follow a formal risk management process in an organization that requires the use of Personally Identifiable Information (PII) as part of the business model?
The amount of risk an organization is willing to accept in pursuit of its mission is known as
Which of the following is the BEST reason for having a formal Request for Proposal (RFP) process?
A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program. Which of the following qualifications and experience would be MOST desirable to find in a candidate?
What key technology can mitigate ransomware threats?
You have implemented the new controls. What is the next step?
At what level of governance are individual projects monitored and managed?
Which control is used to discourage the exploitation of a vulnerability or system?
Which of the following is the MOST important to share with an Information Security Steering Committee:
Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the
following best describes the problem he has encountered?
What is the THIRD state of the Tuckman Stages of Group Development?
The FIRST step in establishing a security governance program is to?
What is a key goal of information security?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning. Which of the following is the MOST logical next step?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
Which of the following is the MOST logical method of deploying security controls within an organization?
Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?
When managing the critical path of an IT security project, which of the following is MOST important?
What role does the statement of retained earnings serve within the financial reporting of an organization?
Which of the following is a fundamental component of an audit record?
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Your Corporate Information Security Policy should include which of the following?
The single most important consideration to make when developing your security program, policies, and processes is:
A method to transfer risk is to:
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your employer?
What is the MOST important reason to have senior leadership endorse security policies?
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
When assessing internal control objectives, what are the auditor's PRIMARY concerns?
Credit card information, medical data, and government records are all examples of:
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
During initial investigation, the team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical aspect of the team’s activities?
The effectiveness of an audit is measured by?
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
Information security policies should be reviewed:
Creating a secondary authentication process for network access would be an example of?
When you develop your audit remediation plan what is the MOST important criteria?
An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:
During a cyber incident, which non-security personnel might be needed to assist the security team?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO discovers the scalability issue will only impact a small number of network segments. What is the next logical step to ensure the proper application of risk management methodology within the two-facto implementation project?
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
What is the MOST effective approach to gaining business unit approval of security controls within an organization?
3 Months Free Update
3 Months Free Update
3 Months Free Update