Download ECCouncil.712-50.SelfTestEngine.2019-12-04.206q.vcex

Download Exam

File Info

Exam EC-Council Certified CISO
Number 712-50
File Name ECCouncil.712-50.SelfTestEngine.2019-12-04.206q.vcex
Size 146 KB
Posted Dec 04, 2019
Download ECCouncil.712-50.SelfTestEngine.2019-12-04.206q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following should be determined while defining risk management strategies?


  1. Organizational objectives and risk tolerance
  2. Enterprise disaster recovery plans
  3. Risk assessment criteria
  4. IT architecture complexity
Correct answer: A



Question 2

A security manager regularly checks work areas after business hours for security violations; such as unsecured files or unattended computers with active sessions.  
This activity BEST demonstrates what part of a security program?


  1. Compliance management
  2. Audit validation
  3. Physical control testing
  4. Security awareness training
Correct answer: A



Question 3

A method to transfer risk is to______________.


  1. Implement redundancy
  2. Move operations to another region
  3. Alignment with business operations
  4. Purchase breach insurance
Correct answer: D



Question 4

An organization licenses and uses personal information for business operations, and a server containing that information has been compromised.  
What kind of law would require notifying the owner or licensee of this incident?


  1. Consumer right disclosure
  2. Data breach disclosure
  3. Special circumstance disclosure
  4. Security incident disclosure
Correct answer: B



Question 5

Why is it vitally important that senior management endorse a security policy?


  1. So that employees will follow the policy directives.
  2. So that they can be held legally accountable.
  3. So that external bodies will recognize the organizations commitment to security.
  4. So that they will accept ownership for security within the organization.
Correct answer: D



Question 6

The PRIMARY objective of security awareness is to:


  1. Encourage security-conscious behavior
  2. Put employees on notice in case follow-up action for noncompliance is necessary
  3. Ensure that security policies are read.
Correct answer: A



Question 7

Which of the following has the GREATEST impact on the implementation of an information security governance model?


  1. Complexity of organizational structure
  2. Distance between physical locations
  3. Organizational budget
  4. Number of employees
Correct answer: A



Question 8

What is the relationship between information protection and regulatory compliance?


  1. That all information in an organization must be protected equally.
  2. The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
  3. There is no relationship between the two.
  4. That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
Correct answer: D



Question 9

The FIRST step in establishing a security governance program is to?


  1. Obtain senior level sponsorship
  2. Conduct a workshop for all end users.
  3. Conduct a risk assessment.
  4. Prepare a security budget.
Correct answer: A



Question 10

When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?


  1. How many credit records are stored?
  2. What is the value of the assets at risk?
  3. What is the scope of the certification?
  4. How many servers do you have?
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files