[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 712-50 Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 712-50
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/712-50.html

EC-Council Certified CISO (CCISO)

Question No: 121 – (Topic 2)

The risk found after a control has been fully implemented is called:

  1. Residual Risk

  2. Total Risk

  3. Post implementation risk

  4. Transferred risk

Answer: A

Question No: 122 – (Topic 2)

Which of the following BEST describes an international standard framework that is based on the security model Information Technology-Code of Practice for Information Security Management?

  1. International Organization for Standardization 27001

  2. National Institute of Standards and Technology Special Publication SP 800-12

  3. Request For Comment 2196

  4. National Institute of Standards and Technology Special Publication SP 800-26

Answer: A

Question No: 123 – (Topic 2)

Which of the following is a fundamental component of an audit record?

  1. Date and time of the event

  2. Failure of the event

  3. Originating IP-Address

  4. Authentication type

Answer: A

Question No: 124 – (Topic 2)

As a new CISO at a large healthcare company you are told that everyone has to badge in to get in the building. Below your office window you notice a door that is normally propped

open during the day for groups of people to take breaks outside. Upon looking closer you see there is no badge reader. What should you do?

  1. Nothing, this falls outside your area of influence.

  2. Close and chain the door shut and send a company-wide memo banning the practice.

  3. Have a risk assessment performed.

  4. Post a guard at the door to maintain physical security

Answer: C

Question No: 125 – (Topic 2)

The effectiveness of an audit is measured by?

  1. The number of actionable items in the recommendations

  2. How it exposes the risk tolerance of the company

  3. How the recommendations directly support the goals of the company

  4. The number of security controls the company has in use

Answer: C

Question No: 126 – (Topic 2)

Which of the following is the MOST important goal of risk management?

  1. Identifying the risk

  2. Finding economic balance between the impact of the risk and the cost of the control

  3. Identifying the victim of any potential exploits.

  4. Assessing the impact of potential threats

Answer: B

Question No: 127 – (Topic 2)

Creating a secondary authentication process for network access would be an example of?

  1. Nonlinearities in physical security performance metrics

  2. Defense in depth cost enumerated costs

  3. System hardening and patching requirements

  4. Anti-virus for mobile devices

Answer: A

Question No: 128 – (Topic 2)

Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?

  1. Senior Executives

  2. Office of the Auditor

  3. Office of the General Counsel

  4. All employees and users

Answer: A

Question No: 129 – (Topic 2)

The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?

  1. Risk metrics

  2. Management metrics

  3. Operational metrics

  4. Compliance metrics

Answer: C

Question No: 130 – (Topic 2)

At which point should the identity access management team be notified of the termination of an employee?

  1. At the end of the day once the employee is off site

  2. During the monthly review cycle

  3. Immediately so the employee account(s) can be disabled

  4. Before an audit

Answer: C

100% Ensurepass Free Download!
Download Free Demo:712-50 Demo PDF
100% Ensurepass Free Guaranteed!
712-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.