100% Guarantee of 712-50 exam answers materials and dump for EC-Council certification for consumer, Real Success Guaranteed with Updated 712-50 pdf dumps vce Materials. 100% PASS EC-Council Certified CISO (CCISO) exam Today!
Check 712-50 free dumps before getting the full version:
NEW QUESTION 1
After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of
- A. Risk Tolerance
- B. Qualitative risk analysis
- C. Risk Appetite
- D. Quantitative risk analysis
Answer: D
NEW QUESTION 2
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
- A. tell him to shut down the server
- B. tell him to call the police
- C. tell him to invoke the incident response process
- D. tell him to analyze the problem, preserve the evidence and provide a full analysis and report
Answer: C
NEW QUESTION 3
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
- A. Failed to identify all stakeholders and their needs
- B. Deployed the encryption solution in an inadequate manner
- C. Used 1024 bit encryption when 256 bit would have sufficed
- D. Used hardware encryption instead of software encryption
Answer: A
NEW QUESTION 4
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
Which of the following would be the FIRST step when addressing Information Security formally and consistently in this organization?
- A. Contract a third party to perform a security risk assessment
- B. Define formal roles and responsibilities for Internal audit functions
- C. Define formal roles and responsibilities for Information Security
- D. Create an executive security steering committee
Answer: C
NEW QUESTION 5
Who should be involved in the development of an internal campaign to address email phishing?
- A. Business unit leaders, CIO, CEO
- B. Business Unite Leaders, CISO, CIO and CEO
- C. All employees
- D. CFO, CEO, CIO
Answer: B
NEW QUESTION 6
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?
- A. International encryption restrictions
- B. Compliance to Payment Card Industry (PCI) data security standards
- C. Compliance with local government privacy laws
- D. Adherence to local data breach notification laws
Answer: B
NEW QUESTION 7
Which of the following has the GREATEST impact on the implementation of an information security governance model?
- A. Organizational budget
- B. Distance between physical locations
- C. Number of employees
- D. Complexity of organizational structure
Answer: D
NEW QUESTION 8
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
- A. Compliance Risk
- B. Reputation Risk
- C. Operational Risk
- D. Strategic Risk
Answer: B
NEW QUESTION 9
Credit card information, medical data, and government records are all examples of:
- A. Confidential/Protected Information
- B. Bodily Information
- C. Territorial Information
- D. Communications Information
Answer: A
NEW QUESTION 10
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
- A. Data breach disclosure
- B. Consumer right disclosure
- C. Security incident disclosure
- D. Special circumstance disclosure
Answer: A
NEW QUESTION 11
The exposure factor of a threat to your organization is defined by?
- A. Asset value times exposure factor
- B. Annual rate of occurrence
- C. Annual loss expectancy minus current cost of controls
- D. Percentage of loss experienced due to a realized threat event
Answer: D
NEW QUESTION 12
Which of the following best describes the sensors designed to project and detect a light beam across an area?
- A. Smoke
- B. Thermal
- C. Air-aspirating
- D. Photo electric
Answer: D
Explanation:
Reference: https://en.wikipedia.org/wiki/Photoelectric_sensor
NEW QUESTION 13
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
- A. low risk-tolerance
- B. high risk-tolerance
- C. moderate risk-tolerance
- D. medium-high risk-tolerance
Answer: A
NEW QUESTION 14
Which of the following is a benefit of information security governance?
- A. Questioning the trust in vendor relationships.
- B. Increasing the risk of decisions based on incomplete management information.
- C. Direct involvement of senior management in developing control processes
- D. Reduction of the potential for civil and legal liability
Answer: D
NEW QUESTION 15
The Information Security Governance program MUST:
- A. integrate with other organizational governance processes
- B. support user choice for Bring Your Own Device (BYOD)
- C. integrate with other organizational governance processes
- D. show a return on investment for the organization
Answer: A
NEW QUESTION 16
Which of the following is an accurate statement regarding capital expenses?
- A. They are easily reduced through the elimination of usage, such as reducing power for lighting of work areas during off-hours
- B. Capital expenses can never be replaced by operational expenses
- C. Capital expenses are typically long-term investments with value being realized through their use
- D. The organization is typically able to regain the initial cost by selling this type of asset
Answer: A
NEW QUESTION 17
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
- A. Your public key
- B. The recipient's private key
- C. The recipient's public key
- D. Certificate authority key
Answer: C
NEW QUESTION 18
Which of the following backup sites takes the longest recovery time?
- A. Cold site
- B. Hot site
- C. Warm site
- D. Mobile backup site
Answer: A
NEW QUESTION 19
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization. How would you prevent such type of attacks?
- A. Conduct thorough background checks before you engage them
- B. Hire the people through third-party job agencies who will vet them for you
- C. Investigate their social networking profiles
- D. It is impossible to block these attacks
Answer: A
NEW QUESTION 20
......
100% Valid and Newest Version 712-50 Questions & Answers shared by Dumpscollection.com, Get Full Dumps HERE: https://www.dumpscollection.net/dumps/712-50/ (New 449 Q&As)
