Download EC-Council Certified CISO.712-50.CertKiller.2019-05-03.204q.vcex

Vendor: ECCouncil
Exam Code: 712-50
Exam Name: EC-Council Certified CISO
Date: May 03, 2019
File Size: 145 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which of the following is the MOST important benefit of an effective security governance process?
  1. Senior management participation in the incident response process
  2. Better vendor management
  3. Reduction of security breaches
  4. Reduction of liability and overall risk to the organization
Correct answer: D
Question 2
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units.  
Which of the following standards and guidelines can BEST address this organization’s need?
  1. International Organization for Standardizations – 22301 (ISO-22301)
  2. Information Technology Infrastructure Library (ITIL)
  3. Payment Card Industry Data Security Standards (PCI-DSS)
  4. International Organization for Standardizations – 27005 (ISO-27005)
Correct answer: A
Question 3
A security manager regularly checks work areas after business hours for security violations; such as unsecured files or unattended computers with active sessions.  
This activity BEST demonstrates what part of a security program?
  1. Compliance management
  2. Audit validation
  3. Physical control testing
  4. Security awareness training
Correct answer: A
Question 4
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised.  
What kind of law would require notifying the owner or licensee of this incident?
  1. Consumer right disclosure
  2. Data breach disclosure
  3. Special circumstance disclosure
  4. Security incident disclosure
Correct answer: B
Question 5
Why is it vitally important that senior management endorse a security policy?
  1. So that employees will follow the policy directives.
  2. So that they can be held legally accountable.
  3. So that external bodies will recognize the organizations commitment to security.
  4. So that they will accept ownership for security within the organization.
Correct answer: D
Question 6
The PRIMARY objective of security awareness is to:
  1. Encourage security-conscious behavior
  2. Put employees on notice in case follow-up action for noncompliance is necessary
  3. Ensure that security policies are read.
Correct answer: A
Question 7
Which of the following is MOST likely to be discretionary?
  1. Policies
  2. Procedures
  3. Guidelines
  4. Standards
Correct answer: C
Question 8
Which of the following has the GREATEST impact on the implementation of an information security governance model?
  1. Complexity of organizational structure
  2. Distance between physical locations
  3. Organizational budget
  4. Number of employees
Correct answer: A
Question 9
What is the relationship between information protection and regulatory compliance?
  1. That all information in an organization must be protected equally.
  2. The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
  3. There is no relationship between the two.
  4. That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
Correct answer: D
Question 10
Who in the organization determines access to information?
  1. Compliance officer
  2. Legal department
  3. Data Owner
  4. Information security officer
Correct answer: C
Question 11
Which of the following is the MOST important benefit of an effective security governance process?
  1. Senior management participation in the incident response process
  2. Better vendor management
  3. Reduction of security breaches
  4. Reduction of liability and overall risk to the organization
Correct answer: D
Question 12
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units.  
Which of the following standards and guidelines can BEST address this organization’s need?
  1. International Organization for Standardizations – 22301 (ISO-22301)
  2. Information Technology Infrastructure Library (ITIL)
  3. Payment Card Industry Data Security Standards (PCI-DSS)
  4. International Organization for Standardizations – 27005 (ISO-27005)
Correct answer: A
Question 13
A security manager regularly checks work areas after business hours for security violations; such as unsecured files or unattended computers with active sessions.  
This activity BEST demonstrates what part of a security program?
  1. Compliance management
  2. Audit validation
  3. Physical control testing
  4. Security awareness training
Correct answer: A
Question 14
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised.  
What kind of law would require notifying the owner or licensee of this incident?
  1. Consumer right disclosure
  2. Data breach disclosure
  3. Special circumstance disclosure
  4. Security incident disclosure
Correct answer: B
Question 15
Why is it vitally important that senior management endorse a security policy?
  1. So that employees will follow the policy directives.
  2. So that they can be held legally accountable.
  3. So that external bodies will recognize the organizations commitment to security.
  4. So that they will accept ownership for security within the organization.
Correct answer: D
Question 16
The PRIMARY objective of security awareness is to:
  1. Encourage security-conscious behavior
  2. Put employees on notice in case follow-up action for noncompliance is necessary
  3. Ensure that security policies are read.
Correct answer: A
Question 17
Which of the following is MOST likely to be discretionary?
  1. Policies
  2. Procedures
  3. Guidelines
  4. Standards
Correct answer: C
Question 18
Which of the following has the GREATEST impact on the implementation of an information security governance model?
  1. Complexity of organizational structure
  2. Distance between physical locations
  3. Organizational budget
  4. Number of employees
Correct answer: A
Question 19
What is the relationship between information protection and regulatory compliance?
  1. That all information in an organization must be protected equally.
  2. The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
  3. There is no relationship between the two.
  4. That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
Correct answer: D
Question 20
Who in the organization determines access to information?
  1. Compliance officer
  2. Legal department
  3. Data Owner
  4. Information security officer
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!