Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = pass65

Pass the ECCouncil CCISO 712-50 Questions and answers with Dumpstech

Exam 712-50 Premium Access

View all detail and faqs for the 712-50 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions
Questions # 1:

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.

What is the MOST logical course of action the CISO should take?

Options:

A.

Review the original solution set to determine if another system would fit the organization’s risk appetite and budgetregulatory compliance requirements

B.

Continue with the implementation and submit change requests to the vendor in order to ensure required functionality will be provided when needed

C.

Continue with the project until the scalability issue is validated by others, such as an auditor or third party assessor

D.

Cancel the project if the business need was based on internal requirements versus regulatory compliance requirements

Questions # 2:

While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?

Options:

A.

Enterprise Risk Assessment

B.

Disaster recovery strategic plan

C.

Business continuity plan

D.

Application mapping document

Questions # 3:

The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?

Options:

A.

There is integration between IT security and business staffing.

B.

There is a clear definition of the IT security mission and vision.

C.

There is an auditing methodology in place.

D.

The plan requires return on investment for all security projects.

Questions # 4:

Which of the following is an industry-agnostic information security control framework?

Options:

A.

Payment Card Industry Data Security Standard (PCI DSS)

B.

International Organization for Standardization ISO/IEC 27001

C.

International Organization for Standardization ISO 27005

D.

Health Insurance Portability and Accountability Act (HIPAA)

Questions # 5:

You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.

Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?

Options:

A.

Scope of the project

B.

Training of the personnel on the project

C.

Timeline of the project milestones

D.

Vendor for the project

Questions # 6:

What are the three hierarchically related aspects of strategic planning and in which order should they be done?

Options:

A.

1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity orinformation security strategic planning

B.

1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Informationtechnology strategic planning

C.

1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity orinformation security strategic planning

D.

1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Informationtechnology strategic planning

Questions # 7:

Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.”

What must you do first in order to shift the prevailing opinion and reshape corporate culture to understand the value of information security to the organization?

Options:

A.

Cite compliance with laws, statutes, and regulations – explaining the financial implications for the company for non-compliance

B.

Understand the business and focus your efforts on enabling operations securely

C.

Draw from your experience and recount stories of how other companies have been compromised

D.

Cite corporate policy and insist on compliance with audit findings

Questions # 8:

Alerting, monitoring, and managing security-related events is typically performed by what security function?

Options:

A.

Threat and vulnerability management

B.

Security compliance

C.

Security operations

D.

Risk management

Questions # 9:

Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.”

Which group of people should be consulted when developing your security program?

Options:

A.

Peers

B.

End Users

C.

Executive Management

D.

All of the above

Questions # 10:

You are evaluating an audit report and notice it only contains lists of findings and technical diagrams. What additional component should be integrated?

Options:

A.

Prior audit reports

B.

Business risk appetite statements

C.

Audit team contact information

D.

Executive summary

Viewing page 1 out of 15 pages
Viewing questions 1-10 out of questions