Download EC-Council Certified CISO.712-50.TestKing.2019-03-15.121q.vcex

Vendor: ECCouncil
Exam Code: 712-50
Exam Name: EC-Council Certified CISO
Date: Mar 15, 2019
File Size: 83 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A stakeholder is a person or group:
  1. Vested in the success and/or failure of a project or initiative regardless of budget implications.
  2. Vested in the success and/or failure of a project or initiative and is tied to the project budget.
  3. That has budget authority.
  4. That will ultimately use the system.
Correct answer: A
Question 2
Your company has a “no right to privacy” notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):
  1. Grant her access, the employee has been adequately warned through the AUP.
  2. Assist her with the request, but only after her supervisor signs off on the action.
  3. Reset the employee’s password and give it to the supervisor.
  4. Deny the request citing national privacy laws.
Correct answer: B
Question 3
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
  1. low risk-tolerance
  2. high risk-tolerance
  3. moderate risk-tolerance
  4. medium-high risk-tolerance
Correct answer: A
Question 4
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
  1. Failed to identify all stakeholders and their needs
  2. Deployed the encryption solution in an inadequate manner
  3. Used 1024 bit encryption when 256 bit would have sufficed
  4. Used hardware encryption instead of software encryption
Correct answer: A
Question 5
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
  1. Type of data contained in the process/system
  2. Type of connection/protocol used to transfer the data
  3. Type of encryption required for the data once it is at rest
  4. Type of computer the data is processed on
Correct answer: A
Question 6
When selecting a security solution with reoccurring maintenance costs after the first year (choose the BEST answer):
  1. The CISO should cut other essential programs to ensure the new solution’s continued use
  2. Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution’s continued use
  3. Defer selection until the market improves and cash flow is positive
  4. Implement the solution and ask for the increased operating cost budget when it is time
Correct answer: B
Question 7
Which of the following information may be found in table top exercises for incident response?
  1. Security budget augmentation
  2. Process improvements
  3. Real-time to remediate
  4. Security control selection
Correct answer: B
Question 8
Your incident response plan should include which of the following?
  1. Procedures for litigation
  2. Procedures for reclamation
  3. Procedures for classification
  4. Procedures for charge-back
Correct answer: C
Question 9
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
  1. Deploy a SEIM solution and have current staff review incidents first thing in the morning
  2. Contract with a managed security provider and have current staff on recall for incident response
  3. Configure your syslog to send SMS messages to current staff when target events are triggered
  4. Employ an assumption of breach protocol and defend only essential information resources
Correct answer: B
Question 10
To get an Information Security project back on schedule, which of the following will provide the MOST help?
  1. Upper management support
  2. More frequent project milestone meetings
  3. Stakeholder support
  4. Extend work hours
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!