We at Crack4sure are committed to giving students who are preparing for the ECCouncil 712-50 Exam the most current and reliable questions . To help people study, we've made some of our EC-Council Certified CISO (CCISO) exam materials available for free to everyone. You can take the Free 712-50 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:
Which of the following is NOT an approach for ethical decision making?
The primary responsibility for assigning entitlements to a network share lies with which role?
The governing body that defines best practices for the collection of digital evidence is the:
An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.
What should the auditor’s NEXT step be?
Which of the following is considered the MOST effective tool against social engineering?
When obtaining new products and services, why is it essential to collaborate with lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?
Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.
However, authorization failures can occur with individuals who have?
Which of the following is the MOST effective method to counter phishing attacks?
Who is responsible for verifying that audit directives are implemented?
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
Which of the following strategies provides the BEST response to a ransomware attack?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
The FIRST step in establishing a security governance program is to?
When you develop your audit remediation plan what is the MOST important criteria?
From an information security perspective, information that no longer supports the main purpose of the business should be:
What two methods are used to assess risk impact?
What is the MOST critical output of the incident response process?
Risk is defined as:
When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?
Which is the BEST solution to monitor, measure, and report changes to critical data in a system?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
The regular review of a firewall ruleset is considered a
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?
Which of the following intellectual Property components is focused on maintaining brand recognition?
One of the MAIN goals of a Business Continuity Plan is to
An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?
Which of the following should be determined while defining risk management strategies?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
What is the relationship between information protection and regulatory compliance?
The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?
You have implemented the new controls. What is the next step?
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
The alerting, monitoring and life-cycle management of security related events is typically handled by the
What is the estimate of all direct and indirect costs associated with an asset or acquisition over its entire life cycle?
Why is it vitally important that senior management endorse a security policy?
What is the MAIN reason for conflicts between Information Technology and Information Security programs?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
What is meant by password aging?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals
the increasing need to address security consistently at the enterprise level. This new CISO, while confident with
skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
From an Information Security Leadership perspective, which of the following is a MAJOR concern about the
CISO’s approach to security?
When updating the security strategic planning document what two items must be included?
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her
annual budget. What is the condition of her current budgetary posture?
At what level of governance are individual projects monitored and managed?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
What phase of the response provides measures to reduce the likelihood of an incident from recurring?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
Which of the following is true regarding expenditures?
The primary purpose of a risk register is to:
Using the Transport Layer Security (TLS) protocol enables a client in a network to be:
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Your Corporate Information Security Policy should include which of the following?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
Which of the following is the MOST logical method of deploying security controls within an organization?
Human resource planning for security professionals in your organization is a:
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has implemented remediation activities. Which of the following is the MOST logical next step?
John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?
Which of the following is an accurate description of a balance sheet?
A digital signature addresses which of the following concerns?
When creating contractual agreements and procurement processes why should security requirements be included?
As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?
As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?
The formal certification and accreditation process has four primary steps, what are they?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
What process defines the framework of rules and practices by which a board of directors ensure accountability, fairness and transparency in an organization's relationship with its shareholders?
Annual Loss Expectancy is derived from the function of which two factors?
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business,
they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they
will be in the organization. How would you prevent such type of attacks?
When project costs continually increase throughout implementation due to large or rapid changes in customer
or user requirements, this is commonly known as:
A CISO has implemented a risk management capability within the security portfolio. Which of the following
terms best describes this functionality?
Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
An example of professional unethical behavior is:
Which of the following is a major benefit of applying risk levels?
Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?
Which of the following are not stakeholders of IT security projects?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
How often should the SSAE16 report of your vendors be reviewed?
Which of the following is the MOST important component of any change management process?
Your incident response plan should include which of the following?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
Your company has a “no right to privacy” notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):
When should IT security project management be outsourced?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?
You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?
Which of the following information may be found in table top exercises for incident response?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
When managing the critical path of an IT security project, which of the following is MOST important?
Which of the following best summarizes the primary goal of a security program?
Which business stakeholder is accountable for the integrity of a new information system?
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
As the CISO for your company you are accountable for the protection of information resources commensurate with:
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
Which of the following is the MAIN security concern for public cloud computing?
The process of identifying and classifying assets is typically included in the
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
Which of the following is a symmetric encryption algorithm?
An anonymity network is a series of?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
What is the FIRST step in developing the vulnerability management program?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
Physical security measures typically include which of the following components?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
Which of the following backup sites takes the longest recovery time?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
The process of creating a system which divides documents based on their security level to manage access to private data is known as
What type of attack requires the least amount of technical equipment and has the highest success rate?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
Which wireless encryption technology makes use of temporal keys?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Security related breaches are assessed and contained through which of the following?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Which of the following is the MOST important to share with an Information Security Steering Committee:
Which of the following refers to the quantity or quality of project deliverables expanding from the original project plan?
A Security Operations Manager is finding it difficult to maintain adequate staff levels to monitor security operations during off-hours. To reduce the impact of staff shortages and increase coverage during off-hours, the SecOps manager is considering outsourcing off-hour coverage.
What Security Operations Center (SOC) model does this BEST describe?
What is the purpose of the statement of retained earnings of an organization?
UESTION NO: 459
A company wants to fill a Chief Information Security Officer position. Which of the following qualifications and experience would be MOST desirable in a candidate?
3 Months Free Update
3 Months Free Update
3 Months Free Update