[Free] 2018(Jan) EnsurePass Testking ECCouncil 712-50 Dumps with VCE and PDF 191-200

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 712-50
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified CISO (CCISO)

Question No: 191 – (Topic 3)

Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?

  1. Security administrators

  2. Security mangers

  3. Security technicians

  4. Security analysts

Answer: B

Question No: 192 – (Topic 3)

An example of professional unethical behavior is:

  1. Gaining access to an affiliated employee’s work email account as part of an officially sanctioned internal investigation

  2. Sharing copyrighted material with other members of a professional organization where all members have legitimate access to the material

  3. Copying documents from an employer’s server which you assert that you have an intellectual property claim to possess, but the company disputes

  4. Storing client lists and other sensitive corporate internal documents on a removable thumb drive

Answer: C

Question No: 193 – (Topic 3)

The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?

  1. Work with the IT group and tell them to put IPS in-line and say it won’t cause any network impact

  2. Explain to the IT group that the IPS won’t cause any network impact because it will fail open

  3. Explain to the IT group that this is a business need and the IPS will fail open however, if there is a network failure the CISO will accept responsibility

  4. Explain to the IT group that the IPS will fail open once in-line however it will be deployed in monitor mode for a set period of time to ensure that it doesn’t block any legitimate traffic

Answer: D

Question No: 194 – (Topic 3)

Which of the following is the MOST important component of any change management process?

  1. Scheduling

  2. Back-out procedures

  3. Outage planning

  4. Management approval

Answer: D

Question No: 195 – (Topic 3)

A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?

  1. Security alignment to business goals

  2. Regulatory compliance effectiveness

  3. Increased security program presence

  4. Proper organizational policy enforcement

Answer: A

Question No: 196 – (Topic 3)

Which of the following is the BEST indicator of a successful project?

  1. it is completed on time or early as compared to the baseline project plan

  2. it meets most of the specifications as outlined in the approved project definition

  3. it comes in at or below the expenditures planned for in the baseline budget

  4. the deliverables are accepted by the key stakeholders

Answer: D

Question No: 197 – (Topic 3)

In effort to save your company money which of the following methods of training results in the lowest cost for the organization?

  1. Distance learning/Web seminars

  2. Formal Class

  3. One-One Training

  4. Self -Study (noncomputerized)

Answer: D

Question No: 198 – (Topic 3)

Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?

  1. System testing

  2. Risk assessment

  3. Incident response

  4. Planning

Answer: A

Question No: 199 – (Topic 3)

Which of the following can the company implement in order to avoid this type of security issue in the future?

  1. Network based intrusion detection systems

  2. A security training program for developers

  3. A risk management process

  4. A audit management process

Answer: B

Question No: 200 – (Topic 3)

A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?

  1. Lack of asset management processes

  2. Lack of change management processes

  3. Lack of hardening standards

  4. Lack of proper access controls

Answer: B

100% Ensurepass Free Download!
Download Free Demo:712-50 Demo PDF
100% Ensurepass Free Guaranteed!
712-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No