Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

712-50 Exam Dumps - EC-Council Certified CISO (CCISO)

Go to page:
Question # 49

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?

A.

Systems logs

B.

Hardware error reports

C.

Utilization reports

D.

Availability reports

Full Access
Question # 50

The PRIMARY objective for information security program development should be:

A.

Reducing the impact of the risk to the business.

B.

Establishing strategic alignment with bunsiness continuity requirements

C.

Establishing incident response programs.

D.

Identifying and implementing the best security solutions.

Full Access
Question # 51

Which of the following is a fundamental component of an audit record?

A.

Date and time of the event

B.

Failure of the event

C.

Originating IP-Address

D.

Authentication type

Full Access
Question # 52

When obtaining new products and services, why is it essential to collaborate with lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others?

A.

This makes sure the files you exchange aren’t unnecessarily flagged by the Data Loss Prevention (DLP) system

B.

Contracting rules typically require you to have conversations with two or more groups

C.

Discussing decisions with a very large group of people always provides a better outcome

D.

It helps to avoid regulatory or internal compliance issues

Full Access
Question # 53

The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:

A.

Security controls group

B.

Governance, risk, and compliance tools

C.

Security Threat and vulnerability management process

D.

Risk assessment process

Full Access
Question # 54

Which of the following is NOT an approach for ethical decision making?

A.

Common good

B.

Utilitarian

C.

Risk based

D.

Fairness

Full Access
Question # 55

What are the common data hiding techniques used by criminals?

A.

Unallocated space and masking

B.

Website defacement and log manipulation

C.

Disabled Logging and admin elevation

D.

Encryption, Steganography, and Changing Metadata/Timestamps

Full Access
Question # 56

If a CISO wants to understand the liabilities of the company, she will refer to the:

A.

Statement of Proxy

B.

Statement of Retained Earnings

C.

once Sheet

D.

Profit and Loss Statement

Full Access
Go to page: