[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 712-50 Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 712-50
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified CISO (CCISO)

Question No: 111 – (Topic 2)

Which of the following activities is the MAIN purpose of the risk assessment process?

  1. Creating an inventory of information assets

  2. Classifying and organizing information assets into meaningful groups

  3. Assigning value to each information asset

  4. Calculating the risks to which assets are exposed in their current setting

Answer: D

Question No: 112 – (Topic 2)

Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?

  1. Use within an organization to formulate security requirements and objectives

  2. Implementation of business-enabling information security

  3. Use within an organization to ensure compliance with laws and regulations

  4. To enable organizations that adopt it to obtain certifications

Answer: B

Question No: 113 – (Topic 2)

An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security

  1. Procedural control

  2. Management control

  3. Technical control

  4. Administrative control

Answer: B

Question No: 114 – (Topic 2)

Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?

  1. All vulnerabilities found on servers and desktops

  2. Only critical and high vulnerabilities on servers and desktops

  3. Only critical and high vulnerabilities that impact important production servers

  4. All vulnerabilities that impact important production servers

Answer: C

Question No: 115 – (Topic 2)

IT control objectives are useful to IT auditors as they provide the basis for understanding the:

  1. Desired results or purpose of implementing specific control procedures.

  2. The audit control checklist.

  3. Techniques for securing information.

  4. Security policy

Answer: A

Question No: 116 – (Topic 2)

Which is the BEST solution to monitor, measure, and report changes to critical data in a system?

  1. Application logs

  2. File integrity monitoring

  3. SNMP traps

  4. Syslog

Answer: B

Question No: 117 – (Topic 2)

The regular review of a firewall ruleset is considered a

  1. Procedural control

  2. Organization control

  3. Technical control

  4. Management control

Answer: A

Question No: 118 – (Topic 2)

As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?

  1. Executive summary

  2. Penetration test agreement

  3. Names and phone numbers of those who conducted the audit

  4. Business charter

Answer: A

Question No: 119 – (Topic 2)

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?

  1. Systems logs

  2. Hardware error reports

  3. Utilization reports

  4. Availability reports

Answer: D

Question No: 120 – (Topic 2)

The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is

  1. Penetration testers

  2. External Audit

  3. Internal Audit

  4. Forensic experts

Answer: B

100% Ensurepass Free Download!
Download Free Demo:712-50 Demo PDF
100% Ensurepass Free Guaranteed!
712-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.