New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

712-50 Exam Dumps - EC-Council Certified CISO (CCISO v3)

Searching for workable clues to ace the ECCouncil 712-50 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 712-50 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 177

Which of the following refers to the quantity or quality of project deliverables expanding from the original project plan?

A.

Deliverable expansion

B.

Scope creep

C.

Deadline extension

D.

Scope modification

Full Access
Question # 178

What does the acronym RACI stand for?

A.

Review, Act, Communicate, and Inform

B.

Responsible, Accountable, Consulted, and Informed

C.

Responsible, Authorized, Consulted, and Initiated

D.

Researched, Advised, Communicated, and Implemented

Full Access
Question # 179

Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?

A.

Asset classification

B.

Security regulations

C.

Information security policy

D.

Data classification

Full Access
Question # 180

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his

assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for

an employee to pass through the main access gate, then the consultant follows the employee behind to get into

the restricted area. Which type of attack did the consultant perform?

A.

Shoulder surfing

B.

Tailgating

C.

Social engineering

D.

Mantrap

Full Access
Question # 181

The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to

A.

assign the responsibility to the information security team.

B.

assign the responsibility to the team responsible for the management of the controls.

C.

create operational reports on the effectiveness of the controls.

D.

perform an independent audit of the security controls.

Full Access
Question # 182

The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):

A.

Failed to identify all stakeholders and their needs

B.

Deployed the encryption solution in an inadequate manner

C.

Used 1024 bit encryption when 256 bit would have sufficed

D.

Used hardware encryption instead of software encryption

Full Access
Question # 183

Which of the following is a major benefit of applying risk levels?

A.

Risk management governance becomes easier since most risks remain low once mitigated

B.

Resources are not wasted on risks that are already managed to an acceptable level

C.

Risk budgets are more easily managed due to fewer identified risks as a result of using a methodology

D.

Risk appetite can increase within the organization once the levels are understood

Full Access
Question # 184

A business unit within your organization intends to deploy a new technology in violation of information security standards. As a security leader, what would be your BEST course of action?

A.

Enforce the existing security standards and block deployment of the new system

B.

Assure that the standards align to the new system

C.

Create an exception for 6 months, then have the business request exception extensions

D.

Perform a risk analysis and provide the results to the business for a decision

Full Access
Go to page: