712-50 EC-Council Certified CISO (CCISO) Questions and Answers
Which of the following is a primary method of applying consistent configurations to IT systems?
What Enterprise Architecture Framework is business-centric and is composed of eight phases?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?
Which of the following is the MOST important result of a business-aligned security program?
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
What type of attack requires the least amount of technical equipment and has the highest success rate?
Which of the following is the BEST choice of security metrics to present to a Board of Directors?
As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with
third parties outside the organization. What protocol provides the ability to extend the network perimeter with
the use of encapsulation and encryption?
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Your Corporate Information Security Policy should include which of the following?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?
What organizational structure combines the functional and project structures to create a hybrid of the two?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement
Which of the following activities must be completed BEFORE you can calculate risk?
Creating a secondary authentication process for network access would be an example of?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how
hardware and software is implemented and managed within the organization. Which of the following principles
does this best demonstrate?
A Security Operations Manager is finding it difficult to maintain adequate staff levels to monitor security operations during off-hours. To reduce the impact of staff shortages and increase coverage during off-hours, the SecOps manager is considering outsourcing off-hour coverage.
What Security Operations Center (SOC) model does this BEST describe?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
When gathering security requirements for an enterprise software solution, which of the following is MOST important?
What are the four groups that are critical to the success of evaluating and approving contracts during the negotiation phase?
During a cyber incident, which non-security personnel might be needed to assist the security team?
What is the PRIMARY guideline when analyzing the cost of a security control versus the cost of the asset?
Ciphertext is encrypted with the same key used by the recipient to decrypt it. What encryption method is being used?
Effective information security management programs require the active involvement of_________
The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?
If the result of an NPV is positive, then the project should be selected. The net present value shows the present
value of the project, based on the decisions taken for its selection. What is the net present value equal to?
Which of the following is the MOST important benefit of an effective security governance process?
What function in an organization is responsible for collecting and communicating processes to facilitate the recovery of critical functions within an organization?
If a CISO wants to understand the liabilities of the company, she will refer to the:
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the
following best describes the problem he has encountered?
Which of the following is the BEST reason for CISO collaboration with legal, IT, and core business functions?
Which of the following is considered one of the most frequent failures in project management?
What principle is used when a CISO evaluates controls to ensure they satisfy the organization’s operational needs?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
You have identified potential solutions for all of your risks that do not have security controls. What is the NEXT step?
The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?
An organization is looking for a framework to measure the efficiency and effectiveness of their Information Security Management System. Which of the following international standards can BEST assist this organization?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
Which of the following is the MOST important to share with an Information Security Steering Committee:
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
When multiple regulations or standards apply to your industry you should set controls to meet the:
What is the purpose of International Organization for Standardization (ISO) 27002?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Why would you follow a formal risk management process in an organization that requires the use of Personally Identifiable Information (PII) as part of the business model?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
What action should you take FIRST?
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
Which of the following is a PRIMARY purpose of a Security Operations Center (SOC)?
Which of the following is the MOST effective approach to secure physical hardware?
Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
Which control is used to discourage the exploitation of a vulnerability or system?
To have accurate and effective information security policies how often should the CISO review the organization policies?
Which of the following would be used to measure the effectiveness of an Information Security Management System (ISMS)?
Which is the BEST solution to monitor, measure, and report changes to critical data in a system?
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
Which of the following provides the BEST ability to view potential financial results in relation to goal achievement?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
When managing the critical path of an IT security project, which of the following is MOST important?
What is the MOST important reason to have senior leadership endorse security policies?
Creating a secondary authentication process for network access would be an example of?
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?
Which of the following can the company implement in order to avoid this type of security issue in the future?
A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
Which of the following is the MOST effective technology to counter phishing attacks?
With respect to the audit management process, management response serves what function?
Which of the following best describes an access control process that confirms the identity of the entity seeking
access to a logical or physical area?
Which security technologies are MOST critical to implementing a zero trust model?
What is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
When analyzing and forecasting a capital expense budget what are not included?
Which of the following is an IT governance framework that allows managers to bridge the gap between control requirements, technical issues, and business risks?
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
How often should an environment be monitored for cyber threats, risks, and exposures?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
IT control objectives are useful to IT auditors as they provide the basis for understanding the:
What is the BEST approach for managing shared elements from multiple regulations and standards?
When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to organizational implementation and management requirements. Which of the following principles does this BEST demonstrate?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?
In defining a strategic security plan for an organization, what should a CISO first analyze?
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
A Chief Information Security Officer received a list of high, medium, and low impact audit findings. Which of the following represents the BEST course of action?
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
Which organizational structure blends elements of functional and project organizational models to create a hybrid reporting structure?
The ability to require implementation and management of security controls within third-party provided services is a critical part of:
Which of the following is the BEST reason for having a formal Request for Proposal (RFP) process?
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?
You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.
Which of the following is NOT documented in the SSP?
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?
Security related breaches are assessed and contained through which of the following?
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
In the event of a cybersecurity breach within a publicly traded company, who bears the ultimate responsibility to the shareholders?
Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:
The Health Insurance Portability and Accountability Act (HIPAA) requires an agreement between Cloud Service Providers (CCSP) and the covered entity. Based on HIPAA. which document must be completed between the covered entity and the CCSP?
To reduce the threat of spear phishing, which of the following is the MOST critical security control to implement?
When obtaining new products and services, why is it essential to collaborate with lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others?
As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?
Which of the following is the MOST critical step when establishing a security governance program?
What role does the statement of retained earnings serve within the financial reporting of an organization?
Which publication serves as a resource of enterprise security-based standards and BEST practices?
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?
Which of the following information may be found in table top exercises for incident response?
If a Virtual Machine’s (VM) data is being replicated and that data is corrupted, this corruption will automatically
be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?
A security project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
A recent audit has identified control exceptions and recommends implementing technology and processes to remediate the finding. Which of the following is the MOST likely reason for the organization to reject the recommendation?
Which of the following is a critical operational component of an Incident Response Program (IRP)?
When would it be more desirable to develop a set of decentralized security policies and procedures within an enterprise environment?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
The organization wants a more permanent solution to the threat to user credential compromise through phishing. What technical solution would BEST address this issue?
At which point should the identity access management team be notified of the termination of an employee?
What oversight should the information security team have in the change management process for application security?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
Your defenses did not hold up to the test as originally thought. As you investigate how the data was compromised through log analysis you discover that a hardworking, but misguided business intelligence analyst posted the data to an obfuscated URL on a popular cloud storage service so they could work on it from home during their off-time. Which technology or solution could you deploy to prevent employees from removing corporate data from your network? Choose the BEST answer.
The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?
When analyzing and forecasting an operating expense budget what are not included?
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s
Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Which of the following compliance standards is the MOST common among retail businesses?
A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?
When dealing with a risk management process, asset classification is important because it will impact the overall:
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
Which of the following best summarizes the primary goal of a security program?
Which of the following is the MOST important for a CISO to understand when identifying threats?
Which of the following has the PRIMARY responsibility for determining access rights requirements to information?
During the last decade, what trend has caused the MOST serious issues in relation to physical security?