Pass4itsure > EC-COUNCIL > EC-COUNCIL Certifications > 712-50 > 712-50 Online Practice Questions and Answers

712-50 Online Practice Questions and Answers

Questions 4

Who in the organization determines access to information?

A. Compliance officer

B. Legal department

C. Data Owner

D. Information security officer

Buy Now
Questions 5

The FIRST step in establishing a security governance program is to?

A. Obtain senior level sponsorship

B. Conduct a workshop for all end users.

C. Conduct a risk assessment.

D. Prepare a security budget.

Buy Now
Questions 6

The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:

A. Getting authority to operate the system from executive management

B. Contacting the Internet Service Provider for an IP scope

C. Changing the default passwords

D. Conducting a final scan of the live system and mitigating all high and medium level vulnerabilities

Buy Now
Questions 7

When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

A. ISO 27001

B. ISO 27004

C. PRINCE2

D. ITILv3

Buy Now
Questions 8

At which point should the identity access management team be notified of the termination of an employee?

A. Immediately so the employee account(s) can be disabled

B. During the monthly review cycle

C. At the end of the day once the employee is off site

D. Before an audit

Buy Now
Questions 9

Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that

your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements.

During your investigation of the rumored compromise, you discover that data has been breached and that the repository of stolen data is on a server located in a foreign country. Your team now has full access to the data on the foreign server.

What action should you take FIRST?

A. Consult with other executives to develop an action plan

B. Contract with a credit reporting company for paid monitoring services for affected customers

C. Contact your local law enforcement agency

D. Destroy the repository of stolen data

Buy Now
Questions 10

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?

A. Shoulder surfing

B. Tailgating

C. Social engineering

D. Mantrap

Buy Now
Questions 11

ABC Limited has recently suffered a security breach with customers' social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.

Which metric would meet the requirement?

A. Number of times third parties access critical information systems

B. Number of systems with known vulnerabilities

C. Number of users with elevated privileges

D. Number of websites with weak or misconfigured certificates

Buy Now
Questions 12

A bastion host should be placed:

A. Inside the DMZ

B. In-line with the data center firewall

C. Beyond the outer perimeter firewall

D. As the gatekeeper to the organization's honeynet

Buy Now
Questions 13

What is the name of a formal statement that defines the strategy, approach, or expectations related to specific concerns within an organization?

A. Policy

B. Procedure

C. Guideline

D. Standard

Buy Now
Exam Code: 712-50
Exam Name: EC-Council Certified CISO (CCISO)
Last Update: Jan 16, 2025
Questions: 468
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99