Special New Year Discounts Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

ExamsBrite Dumps

EC-Council Certified CISO (CCISO) Question and Answers

EC-Council Certified CISO (CCISO)

Last Update Sep 16, 2025
Total Questions : 494

We are offering FREE 712-50 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 712-50 free exam questions and then go for complete pool of EC-Council Certified CISO (CCISO) test questions that will help you more.

712-50 pdf

712-50 PDF

$42  $104.99
712-50 Engine

712-50 Testing Engine

$50  $124.99
712-50 PDF + Engine

712-50 PDF + Testing Engine

$66  $164.99
Questions 1

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

Options:

A.  

‘ o 1=1 - -

B.  

/../../../../

C.  

“DROPTABLE USERNAME”

D.  

NOPS

Discussion 0
Questions 2

Which of the following is considered a project versus a managed process?

Options:

A.  

monitoring external and internal environment during incident response

B.  

ongoing risk assessments of routine operations

C.  

continuous vulnerability assessment and vulnerability repair

D.  

installation of a new firewall system

Discussion 0
Questions 3

This occurs when the quantity or quality of project deliverables is expanded from the original project plan.

Options:

A.  

Scope creep

B.  

Deadline extension

C.  

Scope modification

D.  

Deliverable expansion

Discussion 0
Questions 4

Which of the following can the company implement in order to avoid this type of security issue in the future?

Options:

A.  

Network based intrusion detection systems

B.  

A security training program for developers

C.  

A risk management process

D.  

A audit management process

Discussion 0
Questions 5

An example of professional unethical behavior is:

Options:

A.  

Gaining access to an affiliated employee’s work email account as part of an officially sanctioned internal investigation

B.  

Sharing copyrighted material with other members of a professional organization where all members have legitimate access to the material

C.  

Copying documents from an employer’s server which you assert that you have an intellectual property claim to possess, but the company disputes

D.  

Storing client lists and other sensitive corporate internal documents on a removable thumb drive

Discussion 0
Questions 6

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

Options:

A.  

Risk Assessment

B.  

Incident Response

C.  

Risk Management

D.  

Network Security administration

Discussion 0
Questions 7

Which of the following terms is used to describe countermeasures implemented to minimize risks to physical

property, information, and computing systems?

Options:

A.  

Security frameworks

B.  

Security policies

C.  

Security awareness

D.  

Security controls

Discussion 0
Questions 8

Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.

When formulating the remediation plan, what is a required input?

Options:

A.  

Board of directors

B.  

Risk assessment

C.  

Patching history

D.  

Latest virus definitions file

Discussion 0
Questions 9

Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.

Which of the following industry / sector neutral information security control frameworks should you recommend for implementation?

Options:

A.  

National Institute of Standards and Technology (NIST) Special Publication 800-53

B.  

Payment Card Industry Digital Security Standard (PCI DSS)

C.  

International Organization for Standardization – ISO 27001/2

D.  

British Standard 7799 (BS7799)

Discussion 0
Questions 10

Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.

Your defenses did not hold up to the test as originally thought. As you investigate how the data was compromised through log analysis you discover that a hardworking, but misguided business intelligence analyst posted the data to an obfuscated URL on a popular cloud storage service so they could work on it from home during their off-time. Which technology or solution could you deploy to prevent employees from removing corporate data from your network? Choose the BEST answer.

Options:

A.  

Security Guards posted outside the Data Center

B.  

Data Loss Prevention (DLP)

C.  

Rigorous syslog reviews

D.  

Intrusion Detection Systems (IDS)

Discussion 0
Questions 11

Which of the following is an accurate description of a balance sheet?

Options:

A.  

The percentage of earnings that are retained by the organization for reinvestment in the business

B.  

The details of expenses and revenue over a long period of time

C.  

A summarized statement of all assets and liabilities at a specific point in time

D.  

A review of regulations and requirements impacting the business from a financial perspective

Discussion 0
Questions 12

Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.

You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?

Options:

A.  

Conduct background checks on individuals before hiring them

B.  

Develop an Information Security Awareness program

C.  

Monitor employee browsing and surfing habits

D.  

Set your firewall permissions aggressively and monitor logs regularly.

Discussion 0
Questions 13

Which type of physical security control scan a person’s external features through a digital video camera before

granting access to a restricted area?

Options:

A.  

Iris scan

B.  

Retinal scan

C.  

Facial recognition scan

D.  

Signature kinetics scan

Discussion 0
Questions 14

Which of the following is a symmetric encryption algorithm?

Options:

A.  

3DES

B.  

MD5

C.  

ECC

D.  

RSA

Discussion 0
Questions 15

Which of the following backup sites takes the longest recovery time?

Options:

A.  

Cold site

B.  

Hot site

C.  

Warm site

D.  

Mobile backup site

Discussion 0
Questions 16

The process of creating a system which divides documents based on their security level to manage access to private data is known as

Options:

A.  

security coding

B.  

data security system

C.  

data classification

D.  

privacy protection

Discussion 0
Questions 17

Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?

Options:

A.  

Containment

B.  

Recovery

C.  

Identification

D.  

Eradication

Discussion 0
Questions 18

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

Options:

A.  

The need to change accounting periods on a regular basis.

B.  

The requirement to post entries for a closed accounting period.

C.  

The need to create and modify the chart of accounts and its allocations.

D.  

The lack of policies and procedures for the proper segregation of duties.

Discussion 0
Questions 19

You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?

Options:

A.  

Execute

B.  

Read

C.  

Administrator

D.  

Public

Discussion 0
Questions 20

The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?

Options:

A.  

Well established and defined digital forensics process

B.  

Establishing Enterprise-owned Botnets for preemptive attacks

C.  

Be able to retaliate under the framework of Active Defense

D.  

Collaboration with law enforcement

Discussion 0
Questions 21

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

Options:

A.  

Traffic Analysis

B.  

Deep-Packet inspection

C.  

Packet sampling

D.  

Heuristic analysis

Discussion 0
Questions 22

Physical security measures typically include which of the following components?

Options:

A.  

Physical, Technical, Operational

B.  

Technical, Strong Password, Operational

C.  

Operational, Biometric, Physical

D.  

Strong password, Biometric, Common Access Card

Discussion 0
Questions 23

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

Options:

A.  

Secure the area and shut-down the computer until investigators arrive

B.  

Secure the area and attempt to maintain power until investigators arrive

C.  

Immediately place hard drive and other components in an anti-static bag

D.  

Secure the area.

Discussion 0
Questions 24

How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?

Options:

A.  

Quarterly

B.  

Semi-annually

C.  

Bi-annually

D.  

Annually

Discussion 0
Questions 25

An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?

Options:

A.  

Time zone differences

B.  

Compliance to local hiring laws

C.  

Encryption import/export regulations

D.  

Local customer privacy laws

Discussion 0
Questions 26

Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?

Options:

A.  

Allow the business units to decide which controls apply to their systems, such as the encryption of sensitive data

B.  

Create separate controls for the business units based on the types of business and functions they perform

C.  

Ensure business units are involved in the creation of controls and defining conditions under which they must be applied

D.  

Provide the business units with control mandates and schedules of audits for compliance validation

Discussion 0
Questions 27

Which of the following best summarizes the primary goal of a security program?

Options:

A.  

Provide security reporting to all levels of an organization

B.  

Create effective security awareness to employees

C.  

Manage risk within the organization

D.  

Assure regulatory compliance

Discussion 0
Questions 28

The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?

Options:

A.  

The company lacks a risk management process

B.  

The company does not believe the security vulnerabilities to be real

C.  

The company has a high risk tolerance

D.  

The company lacks the tools to perform a vulnerability assessment

Discussion 0
Questions 29

Risk appetite is typically determined by which of the following organizational functions?

Options:

A.  

Security

B.  

Business units

C.  

Board of Directors

D.  

Audit and compliance

Discussion 0
Questions 30

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

Options:

A.  

Deploy a SEIM solution and have current staff review incidents first thing in the morning

B.  

Contract with a managed security provider and have current staff on recall for incident response

C.  

Configure your syslog to send SMS messages to current staff when target events are triggered

D.  

Employ an assumption of breach protocol and defend only essential information resources

Discussion 0
Questions 31

Which of the following is critical in creating a security program aligned with an organization’s goals?

Options:

A.  

Ensure security budgets enable technical acquisition and resource allocation based on internal compliance requirements

B.  

Develop a culture in which users, managers and IT professionals all make good decisions about information risk

C.  

Provide clear communication of security program support requirements and audit schedules

D.  

Create security awareness programs that include clear definition of security program goals and charters

Discussion 0
Questions 32

Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?

Options:

A.  

Upper management support

B.  

More frequent project milestone meetings

C.  

More training of staff members

D.  

Involve internal audit

Discussion 0
Questions 33

When managing the critical path of an IT security project, which of the following is MOST important?

Options:

A.  

Knowing who all the stakeholders are.

B.  

Knowing the people on the data center team.

C.  

Knowing the threats to the organization.

D.  

Knowing the milestones and timelines of deliverables.

Discussion 0
Questions 34

To get an Information Security project back on schedule, which of the following will provide the MOST help?

Options:

A.  

Upper management support

B.  

More frequent project milestone meetings

C.  

Stakeholder support

D.  

Extend work hours

Discussion 0
Questions 35

The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):

Options:

A.  

Failed to identify all stakeholders and their needs

B.  

Deployed the encryption solution in an inadequate manner

C.  

Used 1024 bit encryption when 256 bit would have sufficed

D.  

Used hardware encryption instead of software encryption

Discussion 0
Questions 36

As the CISO for your company you are accountable for the protection of information resources commensurate with:

Options:

A.  

Customer demand

B.  

Cost and time to replace

C.  

Insurability tables

D.  

Risk of exposure

Discussion 0
Questions 37

A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?

Options:

A.  

Lack of asset management processes

B.  

Lack of change management processes

C.  

Lack of hardening standards

D.  

Lack of proper access controls

Discussion 0
Questions 38

Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?

Options:

A.  

Cost benefit

B.  

Risk appetite

C.  

Business continuity

D.  

Likelihood of impact

Discussion 0
Questions 39

Which of the following represents the best method of ensuring business unit alignment with security program requirements?

Options:

A.  

Provide clear communication of security requirements throughout the organization

B.  

Demonstrate executive support with written mandates for security policy adherence

C.  

Create collaborative risk management approaches within the organization

D.  

Perform increased audits of security processes and procedures

Discussion 0
Questions 40

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?

Options:

A.  

A security organization that is adequately staffed to apply required mitigation strategies and regulatory compliance solutions

B.  

A clear set of security policies and procedures that are more concept-based than controls-based

C.  

A complete inventory of Information Technology assets including infrastructure, networks, applications and data

D.  

A clearly identified executive sponsor who will champion the effort to ensure organizational buy-in

Discussion 0
Questions 41

Which of the following information may be found in table top exercises for incident response?

Options:

A.  

Security budget augmentation

B.  

Process improvements

C.  

Real-time to remediate

D.  

Security control selection

Discussion 0
Questions 42

An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?

Options:

A.  

The CISO

B.  

Audit and Compliance

C.  

The CFO

D.  

The business owner

Discussion 0
Questions 43

When is an application security development project complete?

Options:

A.  

When the application is retired.

B.  

When the application turned over to production.

C.  

When the application reaches the maintenance phase.

D.  

After one year.

Discussion 0
Questions 44

Which business stakeholder is accountable for the integrity of a new information system?

Options:

A.  

CISO

B.  

Compliance Officer

C.  

Project manager

D.  

Board of directors

Discussion 0
Questions 45

When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?

Options:

A.  

Vendors uses their own laptop and logins with same admin credentials your security team uses

B.  

Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses

C.  

Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials

D.  

Vendor uses their own laptop and logins using two factor authentication with their own unique credentials

Discussion 0
Questions 46

You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?

Options:

A.  

Tell the team to do their best and respond to each alert

B.  

Tune the sensors to help reduce false positives so the team can react better

C.  

Request additional resources to handle the workload

D.  

Tell the team to only respond to the critical and high alerts

Discussion 0
Questions 47

Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?

Options:

A.  

Risk Management

B.  

Risk Assessment

C.  

System Testing

D.  

Vulnerability Assessment

Discussion 0
Questions 48

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:

A.  

Type of data contained in the process/system

B.  

Type of connection/protocol used to transfer the data

C.  

Type of encryption required for the data once it is at rest

D.  

Type of computer the data is processed on

Discussion 0
Questions 49

SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning. Which of the following is the MOST logical next step?

Options:

A.  

Validate the effectiveness of current controls

B.  

Create detailed remediation funding and staffing plans

C.  

Report the audit findings and remediation status to business stake holders

D.  

Review security procedures to determine if they need modified according to findings

Discussion 0
Questions 50

Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the

following best describes the problem he has encountered?

Options:

A.  

Rights collision

B.  

Excessive privileges

C.  

Privilege creep

D.  

Least privileges

Discussion 0
Questions 51

File Integrity Monitoring (FIM) is considered a

Options:

A.  

Network based security preventative control

B.  

Software segmentation control

C.  

Security detective control

D.  

User segmentation control

Discussion 0
Questions 52

Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18

members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit

team, the project manager is convinced to add a quality professional to lead to test team at additional cost to

the project.

The project manager is aware of the importance of communication for the success of the project and takes the

step of introducing additional communication channels, making it more complex, in order to assure quality

levels of the project. What will be the first project management document that Smith should change in order to

accommodate additional communication channels?

Options:

A.  

WBS document

B.  

Scope statement

C.  

Change control document

D.  

Risk management plan

Discussion 0
Questions 53

Which of the following is a common technology for visual monitoring?

Options:

A.  

Closed circuit television

B.  

Open circuit television

C.  

Blocked video

D.  

Local video

Discussion 0
Questions 54

You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.

Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?

Options:

A.  

Scope of the project

B.  

Training of the personnel on the project

C.  

Timeline of the project milestones

D.  

Vendor for the project

Discussion 0
Questions 55

Which of the following is MOST useful when developing a business case for security initiatives?

Options:

A.  

Budget forecasts

B.  

Request for proposals

C.  

Cost/benefit analysis

D.  

Vendor management

Discussion 0
Questions 56

A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered

Options:

A.  

Zero-day attack mitigation

B.  

Preventive detection control

C.  

Corrective security control

D.  

Dynamic blocking control

Discussion 0
Questions 57

What is the BEST reason for having a formal request for proposal process?

Options:

A.  

Creates a timeline for purchasing and budgeting

B.  

Allows small companies to compete with larger companies

C.  

Clearly identifies risks and benefits before funding is spent

D.  

Informs suppliers a company is going to make a purchase

Discussion 0
Questions 58

The primary purpose of a risk register is to:

Options:

A.  

Maintain a log of discovered risks

B.  

Track individual risk assessments

C.  

Develop plans for mitigating identified risks

D.  

Coordinate the timing of scheduled risk assessments

Discussion 0
Questions 59

Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.

What action should you take FIRST?

Options:

A.  

Destroy the repository of stolen data

B.  

Contact your local law enforcement agency

C.  

Consult with other C-Level executives to develop an action plan

D.  

Contract with a credit reporting company for paid monitoring services for affected customers

Discussion 0
Questions 60

Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.

How can you reduce the administrative burden of distributing symmetric keys for your employer?

Options:

A.  

Use asymmetric encryption for the automated distribution of the symmetric key

B.  

Use a self-generated key on both ends to eliminate the need for distribution

C.  

Use certificate authority to distribute private keys

D.  

Symmetrically encrypt the key and then use asymmetric encryption to unencrypt it

Discussion 0
Questions 61

The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.

Which of the following needs to be performed NEXT?

Options:

A.  

Verify the scope of the project

B.  

Verify the regulatory requirements

C.  

Verify technical resources

D.  

Verify capacity constraints

Discussion 0
Questions 62

Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.

You have identified potential solutions for all of your risks that do not have security controls. What is the NEXT step?

Options:

A.  

Get approval from the board of directors

B.  

Screen potential vendor solutions

C.  

Verify that the cost of mitigation is less than the risk

D.  

Create a risk metrics for all unmitigated risks

Discussion 0
Questions 63

Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.

What is one proven method to account for common elements found within separate regulations and/or standards?

Options:

A.  

Hire a GRC expert

B.  

Use the Find function of your word processor

C.  

Design your program to meet the strictest government standards

D.  

Develop a crosswalk

Discussion 0
Questions 64

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and

uses the special card in order to access the restricted area of the target company. Just as the employee opens

the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so

that he can enter. What is the best way to undermine the social engineering activity of tailgating?

Options:

A.  

Post a sign that states, “no tailgating” next to the special card reader adjacent to the secure door

B.  

Issue special cards to access secure doors at the company and provide a one-time only brief description of

use of the special card

C.  

Educate and enforce physical security policies of the company to all the employees on a regular basis

D.  

Setup a mock video camera next to the special card reader adjacent to the secure door

Discussion 0
Questions 65

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

Once supervisors and data owners have approved requests, information system administrators will implement

Options:

A.  

Technical control(s)

B.  

Management control(s)

C.  

Policy control(s)

D.  

Operational control(s)

Discussion 0
Questions 66

Where does bottom-up financial planning primarily gain information for creating budgets?

Options:

A.  

By adding all capital and operational costs from the prior budgetary cycle, and determining potential

financial shortages

B.  

By reviewing last year’s program-level costs and adding a percentage of expected additional portfolio costs

C.  

By adding the cost of all known individual tasks and projects that are planned for the next budgetary cycle

D.  

By adding all planned operational expenses per quarter then summarizing them in a budget request

Discussion 0
Questions 67

Which of the following best describes revenue?

Options:

A.  

Non-operating financial liabilities minus expenses

B.  

The true profit-making potential of an organization

C.  

The sum value of all assets and cash flow into the business

D.  

The economic benefit derived by operating a business

Discussion 0
Questions 68

Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:

Options:

A.  

Create timelines for mitigation

B.  

Develop a cost-benefit analysis

C.  

Calculate annual loss expectancy

D.  

Create a detailed technical executive summary

Discussion 0
Questions 69

Which of the following is true regarding expenditures?

Options:

A.  

Capital expenditures are never taxable

B.  

Operating expenditures are for acquiring assets, capital expenditures are for support costs of that asset

C.  

Capital expenditures are used to define depreciation tables of intangible assets

D.  

Capital expenditures are for acquiring assets, whereas operating expenditures are for support costs of that

asset

Discussion 0
Questions 70

Which of the following information would MOST likely be reported at the board-level within an organization?

Options:

A.  

System scanning trends and results as they pertain to insider and external threat sources

B.  

The capabilities of a security program in terms of staffing support

C.  

Significant risks and security incidents that have been discovered since the last assembly of the

membership

D.  

The numbers and types of cyberattacks experienced by the organization since the last assembly of the

membership

Discussion 0
Questions 71

During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her

annual budget. What is the condition of her current budgetary posture?

Options:

A.  

The budget is in a temporary state of imbalance

B.  

The budget is operating at a deficit

C.  

She can realign the budget through moderate capital expense (CAPEX) allocation

D.  

She has a surplus of operational expenses (OPEX)

Discussion 0
Questions 72

A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?

Options:

A.  

Public cloud

B.  

Private cloud

C.  

Community cloud

D.  

Hybrid cloud

Discussion 0
Questions 73

Which of the following BEST mitigates ransomware threats?

Options:

A.  

Phishing exercises

B.  

Use immutable data storage

C.  

Blocking use of wireless networks

D.  

Application of multiple endpoint anti-malware solutions

Discussion 0
Questions 74

When developing the Business Impact Assessment (BIA), which of the following MOST closely relates to data backup and restoration?

Options:

A.  

Maximum Tolerable Downtime (MTD)

B.  

Recovery Point Objective (RPO)

C.  

Mean Time to Del very >MTD)

D.  

Recovery Time Objective (RTO)

Discussion 0
Questions 75

What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?

Options:

A.  

Business Impact Analysis

B.  

Economic Impact analysis

C.  

Return on Investment

D.  

Cost-benefit analysis

Discussion 0
Questions 76

While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?

Options:

A.  

it is not effective for smaller investments

B.  

It is not accepted by many accounting rules

C.  

lt is the least precise

D.  

positive result is an indication that the effort should be pursued

Discussion 0
Questions 77

A bastion host should be placed:

Options:

A.  

Inside the DMZ

B.  

In-line with the data center firewall

C.  

Beyond the outer perimeter firewall

D.  

As the gatekeeper to the organization’s honeynet

Discussion 0
Questions 78

What is a Statement of Objectives (SOA)?

Options:

A.  

A section of a contract that defines tasks to be performed under said contract

B.  

An outline of what the military will do during war

C.  

A document that outlines specific desired outcomes as part of a request for proposal

D.  

Business guidance provided by the CEO

Discussion 0
Questions 79

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

Options:

A.  

Recovery Point Objective (RPO)

B.  

Mean Time to Delivery (MTD)

C.  

Recovery Time Objective (RTO)

D.  

Maximum Tolerable Downtime (MTD)

Discussion 0
Questions 80

What organizational structure combines the functional and project structures to create a hybrid of the two?

Options:

A.  

Traditional

B.  

Composite

C.  

Project

D.  

Matrix

Discussion 0
Questions 81

The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.

Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?

Options:

A.  

The project is over budget

B.  

The project budget has reserves

C.  

The project cost is in alignment with the budget

D.  

The project is under budget

Discussion 0
Questions 82

An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).

The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?

Options:

A.  

ISO 22318 Supply Chain Continuity

B.  

ISO 27031 BCM Readiness

C.  

ISO 22301 BCM Requirements

D.  

ISO 22317 BIA

Discussion 0
Questions 83

What is protected by Federal Information Processing Standards (FIPS) 140-2?

Options:

A.  

Integrity

B.  

Confidentiality

C.  

Non-repudiation

D.  

Availability

Discussion 0
Questions 84

From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:

Options:

A.  

Has a direct correlation with the CISO’s budget

B.  

Represents, in part, the savings generated by the proper acquisition and implementation of security controls

C.  

Represents the sum of all capital expenditures

D.  

Represents the percentage of earnings that could in part be used to finance future security controls

Discussion 0
Questions 85

A Security Operations Manager is finding it difficult to maintain adequate staff levels to monitor security operations during off-hours. To reduce the impact of staff shortages and increase coverage during off-hours, the SecOps manager is considering outsourcing off-hour coverage.

What Security Operations Center (SOC) model does this BEST describe?

Options:

A.  

Virtual SOC

B.  

In-house SOC

C.  

Security Network Operations Center (SNOC)

D.  

Hybrid SOC

Discussion 0
Questions 86

What is the purpose of the statement of retained earnings of an organization?

Options:

A.  

It represents the sum of all capital expenditures

B.  

It represents the percentage of earnings that could in part be used to finance future security controls

C.  

It represents the savings generated by the proper acquisition and implementation of security controls

D.  

It has a direct correlation with the CISO’s budget

Discussion 0
Questions 87

To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?

Options:

A.  

Compliance management

B.  

Asset management

C.  

Risk management

D.  

Security management

Discussion 0
Questions 88

When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:

Options:

A.  

Patch management

B.  

Network monitoring

C.  

Ability to provide security services tailored to the business’ needs

D.  

24/7 tollfree number

Discussion 0
Questions 89

A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to organizational implementation and management requirements. Which of the following principles does this BEST demonstrate?

Options:

A.  

Proper budget management

B.  

Leveraging existing implementations

C.  

Alignment with the business

D.  

Effective use of existing technologies

Discussion 0
Questions 90

Effective information security management programs require the active involvement of_________

Options:

A.  

ClOS

B.  

All employees

C.  

Security Managers

D.  

Executives

Discussion 0
Questions 91

What is the THIRD state of the Tuckman Stages of Group Development?

Options:

A.  

Performing

B.  

Norming

C.  

Storming

D.  

Forming

Discussion 0
Questions 92

What is the MOST critical output of the incident response process?

Options:

A.  

A complete document of all involved team members and the support they provided

B.  

Recovery of all data from affected systems

C.  

Lessons learned from the incident, so they can be incorporated into the incident response processes

D.  

Clearly defined documents detailing standard evidence collection and preservation processes

Discussion 0
Questions 93

Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?

Options:

A.  

Business Impact Analysis

B.  

Cost-benefit analysis

C.  

Economic impact analysis

D.  

Return on Investment

Discussion 0
Questions 94

Which of the following strategies provides the BEST response to a ransomware attack?

Options:

A.  

Real-time off-site replication

B.  

Daily incremental backup

C.  

Daily full backup

D.  

Daily differential backup

Discussion 0
Questions 95

With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:

Options:

A.  

Metrics tracking security milestones, understanding criticality of information and information security, visibility into the types of information and how it is used, endorsement by the board of directors

B.  

Annual security training for all employees, continual budget reviews, endorsement of the development and implementation of a security program, metrics to track the program

C.  

Understanding criticality of information and information security, review investment in information security, endorse development and implementation of a security program, and require regular reports on adequacy and effectiveness

D.  

Endorsement by the board of directors for security program, metrics of security program milestones, annual budget review, report on integration and acceptance of program

Discussion 0
Questions 96

Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.

However, authorization failures can occur with individuals who have?

Options:

A.  

Glaucoma or cataracts

B.  

Two different colored eyes (heterochromia iridium)

C.  

Contact lens

D.  

Malaria

Discussion 0
Questions 97

Providing oversight of an information security program for the organization is the primary responsibility of which group?

Options:

A.  

Office of the Auditor

B.  

Senior Executives

C.  

Office of the General Counsel

D.  

All employees and users

Discussion 0
Questions 98

What standard would you use to help determine key performance indicators?

Options:

A.  

ITIL

B.  

FIPS140-2

C.  

NI5TSP800-53

D.  

NISTSP800-5S

Discussion 0
Questions 99

The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:

Options:

A.  

Security controls group

B.  

Governance, risk, and compliance tools

C.  

Security Threat and vulnerability management process

D.  

Risk assessment process

Discussion 0
Questions 100

If a CISO wants to understand the liabilities of the company, she will refer to the:

Options:

A.  

Statement of Proxy

B.  

Statement of Retained Earnings

C.  

once Sheet

D.  

Profit and Loss Statement

Discussion 0
Questions 101

What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

Options:

A.  

Only IDS is susceptible to false positives

B.  

An IPS examines network traffic flows to detect and actively stop exploits and attacks

C.  

IPS identify potentially malicious traffic based on signature or behavior and IDS does not

D.  

IDS are typically deployed behind the firewall and IPS are deployed in front of the firewall

Discussion 0
Questions 102

Which of the following is a countermeasure to prevent unauthorized database access from web applications?

Options:

A.  

Session encryption

B.  

Removing all stored procedures

C.  

Input sanitization

D.  

Library control

Discussion 0
Questions 103

What is the FIRST step in developing the vulnerability management program?

Options:

A.  

Baseline the Environment

B.  

Maintain and Monitor

C.  

Organization Vulnerability

D.  

Define Policy

Discussion 0
Questions 104

One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?

Options:

A.  

Your public key

B.  

The recipient's private key

C.  

The recipient's public key

D.  

Certificate authority key

Discussion 0
Questions 105

While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?

Options:

A.  

Enterprise Risk Assessment

B.  

Disaster recovery strategic plan

C.  

Business continuity plan

D.  

Application mapping document

Discussion 0
Questions 106

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Options:

A.  

Trusted and untrusted networks

B.  

Type of authentication

C.  

Storage encryption

D.  

Log retention

Discussion 0
Questions 107

Which wireless encryption technology makes use of temporal keys?

Options:

A.  

Wireless Application Protocol (WAP)

B.  

Wifi Protected Access version 2 (WPA2)

C.  

Wireless Equivalence Protocol (WEP)

D.  

Extensible Authentication Protocol (EAP)

Discussion 0
Questions 108

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

Options:

A.  

chain of custody.

B.  

electronic discovery.

C.  

evidence tampering.

D.  

electronic review.

Discussion 0
Questions 109

Which of the following is the MAIN security concern for public cloud computing?

Options:

A.  

Unable to control physical access to the servers

B.  

Unable to track log on activity

C.  

Unable to run anti-virus scans

D.  

Unable to patch systems as needed

Discussion 0
Questions 110

What type of attack requires the least amount of technical equipment and has the highest success rate?

Options:

A.  

War driving

B.  

Operating system attacks

C.  

Social engineering

D.  

Shrink wrap attack

Discussion 0
Questions 111

An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?

Options:

A.  

Shared key

B.  

Asynchronous

C.  

Open

D.  

None

Discussion 0
Questions 112

The process of identifying and classifying assets is typically included in the

Options:

A.  

Threat analysis process

B.  

Asset configuration management process

C.  

Business Impact Analysis

D.  

Disaster Recovery plan

Discussion 0
Questions 113

A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

Options:

A.  

non-repudiation

B.  

conflict resolution

C.  

strong authentication

D.  

digital rights management

Discussion 0
Questions 114

An anonymity network is a series of?

Options:

A.  

Covert government networks

B.  

War driving maps

C.  

Government networks in Tora

D.  

Virtual network tunnels

Discussion 0
Questions 115

Security related breaches are assessed and contained through which of the following?

Options:

A.  

The IT support team.

B.  

A forensic analysis.

C.  

Incident response

D.  

Physical security team.

Discussion 0
Questions 116

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

Options:

A.  

In-line hardware keyloggers don’t require physical access

B.  

In-line hardware keyloggers don’t comply to industry regulations

C.  

In-line hardware keyloggers are undetectable by software

D.  

In-line hardware keyloggers are relatively inexpensive

Discussion 0
Questions 117

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

1.Covering tracks

2.Scanning and enumeration

3.Maintaining Access

4.Reconnaissance

5.Gaining Access

Options:

A.  

4, 2, 5, 3, 1

B.  

2, 5, 3, 1, 4

C.  

4, 5, 2, 3, 1

D.  

4, 3, 5, 2, 1

Discussion 0
Questions 118

Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?

Options:

A.  

Configure logging on each access point

B.  

Install a firewall software on each wireless access point.

C.  

Provide IP and MAC address

D.  

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

Discussion 0
Questions 119

Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?

Options:

A.  

Comprehensive Log-Files from all servers and network devices affected during the attack

B.  

Fully trained network forensic experts to analyze all data right after the attack

C.  

Uninterrupted Chain of Custody

D.  

Expert forensics witness

Discussion 0
Questions 120

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.  

It is an IPSec protocol.

B.  

It is a text-based communication protocol.

C.  

It uses TCP port 22 as the default port and operates at the application layer.

D.  

It uses UDP port 22

Discussion 0
Questions 121

An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:

Options:

A.  

Number of change orders rejected

B.  

Number and length of planned outages

C.  

Number of unplanned outages

D.  

Number of change orders processed

Discussion 0
Questions 122

Which of the following is MOST important when dealing with an Information Security Steering committee:

Options:

A.  

Include a mix of members from different departments and staff levels.

B.  

Ensure that security policies and procedures have been vetted and approved.

C.  

Review all past audit and compliance reports.

D.  

Be briefed about new trends and products at each meeting by a vendor.

Discussion 0
Questions 123

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?

Options:

A.  

The asset owner

B.  

The asset manager

C.  

The data custodian

D.  

The project manager

Discussion 0
Questions 124

When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?

Options:

A.  

How many credit card records are stored?

B.  

How many servers do you have?

C.  

What is the scope of the certification?

D.  

What is the value of the assets at risk?

Discussion 0
Questions 125

Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?

Options:

A.  

Use within an organization to formulate security requirements and objectives

B.  

Implementation of business-enabling information security

C.  

Use within an organization to ensure compliance with laws and regulations

D.  

To enable organizations that adopt it to obtain certifications

Discussion 0
Questions 126

As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?

Options:

A.  

Executive summary

B.  

Penetration test agreement

C.  

Names and phone numbers of those who conducted the audit

D.  

Business charter

Discussion 0
Questions 127

Credit card information, medical data, and government records are all examples of:

Options:

A.  

Confidential/Protected Information

B.  

Bodily Information

C.  

Territorial Information

D.  

Communications Information

Discussion 0
Questions 128

Which of the following are necessary to formulate responses to external audit findings?

Options:

A.  

Internal Audit, Management, and Technical Staff

B.  

Internal Audit, Budget Authority, Management

C.  

Technical Staff, Budget Authority, Management

D.  

Technical Staff, Internal Audit, Budget Authority

Discussion 0
Questions 129

To have accurate and effective information security policies how often should the CISO review the organization policies?

Options:

A.  

Every 6 months

B.  

Quarterly

C.  

Before an audit

D.  

At least once a year

Discussion 0
Questions 130

Which of the following is the MOST important goal of risk management?

Options:

A.  

Identifying the risk

B.  

Finding economic balance between the impact of the risk and the cost of the control

C.  

Identifying the victim of any potential exploits.

D.  

Assessing the impact of potential threats

Discussion 0
Questions 131

Which of the following provides an audit framework?

Options:

A.  

Control Objectives for IT (COBIT)

B.  

Payment Card Industry-Data Security Standard (PCI-DSS)

C.  

International Organization Standard (ISO) 27002

D.  

National Institute of Standards and Technology (NIST) SP 800-30

Discussion 0
Questions 132

A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?

Options:

A.  

Compliance to the Payment Card Industry (PCI) regulations.

B.  

Alignment with financial reporting regulations for each country where they operate.

C.  

Alignment with International Organization for Standardization (ISO) standards.

D.  

Compliance with patient data protection regulations for each country where they operate.

Discussion 0
Questions 133

If your organization operates under a model of "assumption of breach", you should:

Options:

A.  

Protect all information resource assets equally

B.  

Establish active firewall monitoring protocols

C.  

Purchase insurance for your compliance liability

D.  

Focus your security efforts on high value assets

Discussion 0
Questions 134

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?

Options:

A.  

Systems logs

B.  

Hardware error reports

C.  

Utilization reports

D.  

Availability reports

Discussion 0
Questions 135

A Chief Information Security Officer received a list of high, medium, and low impact audit findings. Which of the following represents the BEST course of action?

Options:

A.  

If the findings impact regulatory compliance, try to apply remediation that will address the most findings for the least cost.

B.  

If the findings do not impact regulatory compliance, remediate only the high and medium risk findings.

C.  

If the findings impact regulatory compliance, remediate the high findings as quickly as possible.

D.  

If the findings do not impact regulatory compliance, review current security controls.

Discussion 0
Questions 136

An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security

Options:

A.  

Procedural control

B.  

Management control

C.  

Technical control

D.  

Administrative control

Discussion 0
Questions 137

Which of the following is MOST likely to be discretionary?

Options:

A.  

Policies

B.  

Procedures

C.  

Guidelines

D.  

Standards

Discussion 0
Questions 138

The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to

Options:

A.  

assign the responsibility to the information security team.

B.  

assign the responsibility to the team responsible for the management of the controls.

C.  

create operational reports on the effectiveness of the controls.

D.  

perform an independent audit of the security controls.

Discussion 0
Questions 139

According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?

Options:

A.  

Susceptibility to attack, mitigation response time, and cost

B.  

Attack vectors, controls cost, and investigation staffing needs

C.  

Vulnerability exploitation, attack recovery, and mean time to repair

D.  

Susceptibility to attack, expected duration of attack, and mitigation availability

Discussion 0
Questions 140

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

Options:

A.  

Audit and Legal

B.  

Budget and Compliance

C.  

Human Resources and Budget

D.  

Legal and Human Resources

Discussion 0
Questions 141

When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

Options:

A.  

ISO 27001

B.  

PRINCE2

C.  

ISO 27004

D.  

ITILv3

Discussion 0
Questions 142

Which of the following most commonly falls within the scope of an information security governance steering committee?

Options:

A.  

Approving access to critical financial systems

B.  

Developing content for security awareness programs

C.  

Interviewing candidates for information security specialist positions

D.  

Vetting information security policies

Discussion 0
Questions 143

An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?

Options:

A.  

Determine the annual loss expectancy (ALE)

B.  

Create a crisis management plan

C.  

Create technology recovery plans

D.  

Build a secondary hot site

Discussion 0
Questions 144

What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?

Options:

A.  

Test every three years to ensure that things work as planned

B.  

Conduct periodic tabletop exercises to refine the BC plan

C.  

Outsource the creation and execution of the BC plan to a third party vendor

D.  

Conduct a Disaster Recovery (DR) exercise every year to test the plan

Discussion 0
Questions 145

The patching and monitoring of systems on a consistent schedule is required by?

Options:

A.  

Local privacy laws

B.  

Industry best practices

C.  

Risk Management frameworks

D.  

Audit best practices

Discussion 0
Questions 146

Quantitative Risk Assessments have the following advantages over qualitative risk assessments:

Options:

A.  

They are objective and can express risk / cost in real numbers

B.  

They are subjective and can be completed more quickly

C.  

They are objective and express risk / cost in approximates

D.  

They are subjective and can express risk /cost in real numbers

Discussion 0
Questions 147

During the course of a risk analysis your IT auditor identified threats and potential impacts. Next, your IT auditor should:

Options:

A.  

Identify and evaluate the existing controls.

B.  

Disclose the threats and impacts to management.

C.  

Identify information assets and the underlying systems.

D.  

Identify and assess the risk assessment process used by management.

Discussion 0
Questions 148

Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?

Options:

A.  

Need to comply with breach disclosure laws

B.  

Need to transfer the risk associated with hosting PII data

C.  

Need to better understand the risk associated with using PII data

D.  

Fiduciary responsibility to safeguard credit card information

Discussion 0