[Free] 2017(Sep) EnsurePass Pass4sure ECCouncil 712-50 Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep ECCouncil Official New Released 712-50
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/712-50.html

EC-Council Certified CISO (CCISO)

Question No: 131 – (Topic 2)

Which of the following activities results in change requests?

  1. Preventive actions

  2. Inspection

  3. Defect repair

  4. Corrective actions

Answer: A

Question No: 132 – (Topic 2)

The patching and monitoring of systems on a consistent schedule is required by?

  1. Local privacy laws

  2. Industry best practices

  3. Risk Management frameworks

  4. Audit best practices

Answer: C

Question No: 133 – (Topic 2)

The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s

  1. Risk Management Program.

  2. Anti-Spam controls.

  3. Security Awareness Program.

  4. Identity and Access Management Program.

Answer: C

Question No: 134 – (Topic 2)

An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?

  1. Management Control

  2. Technical Control

  3. Training Control

  4. Operational Control

Answer: D

Question No: 135 – (Topic 2)

When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?

  1. Threat Level, Risk of Compromise, and Consequences of Compromise

  2. Risk Avoidance, Threat Level, and Consequences of Compromise

  3. Risk Transfer, Reputational Impact, and Consequences of Compromise

  4. Reputational Impact, Financial Impact, and Risk of Compromise

Answer: A

Question No: 136 – (Topic 2)

Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?

  1. Perform a vulnerability scan of the network

  2. External penetration testing by a qualified third party

  3. Internal Firewall ruleset reviews

  4. Implement network intrusion prevention systems

Answer: B

Question No: 137 – (Topic 2)

When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?

  1. Transfer financial resources from other critical programs

  2. Take the system off line until the budget is available

  3. Deploy countermeasures and compensating controls until the budget is available

  4. Schedule an emergency meeting and request the funding to fix the issue

Answer: C

Question No: 138 – (Topic 2)

An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:

  1. Number of change orders rejected

  2. Number and length of planned outages

  3. Number of unplanned outages

  4. Number of change orders processed

Answer: C

Question No: 139 – (Topic 2)

You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  1. Qualitative analysis

  2. Quantitative analysis

  3. Risk mitigation

  4. Estimate activity duration

Answer: A

Question No: 140 – (Topic 2)

Which represents PROPER separation of duties in the corporate environment?

  1. Information Security and Identity Access Management teams perform two distinct functions

  2. Developers and Network teams both have admin rights on servers

  3. Finance has access to Human Resources data

  4. Information Security and Network teams perform two distinct functions

Answer: D

100% Ensurepass Free Download!
Download Free Demo:712-50 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass 712-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.