[Free] 2018(Jan) EnsurePass Testking ECCouncil 712-50 Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 712-50
100% Free Download! 100% Pass Guaranteed!

EC-Council Certified CISO (CCISO)

Question No: 201 – (Topic 3)

A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?

  1. The software license expiration is probably out of synchronization with other software licenses

  2. The project was initiated without an effort to get support from impacted business units in the organization

  3. The software is out of date and does not provide for a scalable solution across the enterprise

  4. The security officer should allow time for the organization to get accustomed to her presence before initiating security projects

Answer: B

Question No: 202 – (Topic 3)

When managing the critical path of an IT security project, which of the following is MOST important?

  1. Knowing who all the stakeholders are.

  2. Knowing the people on the data center team.

  3. Knowing the threats to the organization.

  4. Knowing the milestones and timelines of deliverables.

Answer: D

Question No: 203 – (Topic 3)

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?

  1. A security organization that is adequately staffed to apply required mitigation strategies and regulatory compliance solutions

  2. A clear set of security policies and procedures that are more concept-based than


  3. A complete inventory of Information Technology assets including infrastructure, networks, applications and data

  4. A clearly identified executive sponsor who will champion the effort to ensure organizational buy-in

Answer: D

Question No: 204 – (Topic 3)

Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?

  1. User awareness training for all employees

  2. Installation of new firewalls and intrusion detection systems

  3. Launch an internal awareness campaign

  4. Integrate security requirements into project inception

Answer: D

Question No: 205 – (Topic 3)

The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?

  1. The company lacks a risk management process

  2. The company does not believe the security vulnerabilities to be real

  3. The company has a high risk tolerance

  4. The company lacks the tools to perform a vulnerability assessment

Answer: C

Question No: 206 – (Topic 3)

Which of the following is critical in creating a security program aligned with an organization’s goals?

  1. Ensure security budgets enable technical acquisition and resource allocation based on internal compliance requirements

  2. Develop a culture in which users, managers and IT professionals all make good decisions about information risk

  3. Provide clear communication of security program support requirements and audit schedules

  4. Create security awareness programs that include clear definition of security program goals and charters

Answer: B

Question No: 207 – (Topic 3)

A stakeholder is a person or group:

  1. Vested in the success and/or failure of a project or initiative regardless of budget implications.

  2. Vested in the success and/or failure of a project or initiative and is tied to the project budget.

  3. That has budget authority.

  4. That will ultimately use the system.

Answer: A

Question No: 208 – (Topic 3)

As the CISO for your company you are accountable for the protection of information resources commensurate with:

  1. Customer demand

  2. Cost and time to replace

  3. Insurability tables

  4. Risk of exposure

Answer: D

Question No: 209 – (Topic 3)

In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?

  1. Vmware, router, switch, firewall, syslog, vulnerability management system (VMS)

  2. Intrusion Detection System (IDS), firewall, switch, syslog

  3. Security Incident Event Management (SIEM), IDS, router, syslog

  4. SIEM, IDS, firewall, VMS

Answer: D

Question No: 210 – (Topic 3)

Which of the following is considered one of the most frequent failures in project management?

  1. Overly restrictive management

  2. Excessive personnel on project

  3. Failure to meet project deadlines

  4. Insufficient resources

Answer: C

100% Ensurepass Free Download!
Download Free Demo:712-50 Demo PDF
100% Ensurepass Free Guaranteed!
712-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No