ECCouncil 712-50 EC-Council Certified CISO (CCISO) Exam Practice Test
EC-Council Certified CISO (CCISO) Questions and Answers
What is the main purpose of the Incident Response Team?
IT control objectives are useful to IT auditors as they provide the basis for understanding the:
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
What is the THIRD state of the Tuckman Stages of Group Development?
The patching and monitoring of systems on a consistent schedule is required by?
Which of the following is MOST useful when developing a business case for security initiatives?
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a
solution stopping people from entering certain restricted zones without proper credentials. Which of following
physical security measures should the administrator use?
The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
Creating a secondary authentication process for network access would be an example of?
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
A Chief Information Security Officer received a list of high, medium, and low impact audit findings. Which of the following represents the BEST course of action?
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
What cloud computing environment allows access and use by several organizations for information sharing?
What is the PRIMARY difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
Which of the following is a critical operational component of an Incident Response Program (IRP)?
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
Which of the following is the MOST effective method to measure the effectiveness of security controls in a perimeter network?
Which of the following defines the boundaries and scope of a risk assessment?
Creating a secondary authentication process for network access would be an example of?
As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with
third parties outside the organization. What protocol provides the ability to extend the network perimeter with
the use of encapsulation and encryption?
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
What is the MOST likely detrimental consequence arising from an ineffective security governance program within a highly regulated organization?
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program. Which of the following qualifications and experience would be MOST desirable to find in a candidate?
What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?
What is the purpose of the statement of retained earnings of an organization?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
During initial investigation, the team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical aspect of the team’s activities?
Effective information security management programs require the active involvement of_________
Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18
members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit
team, the project manager is convinced to add a quality professional to lead to test team at additional cost to
the project.
The project manager is aware of the importance of communication for the success of the project and takes the
step of introducing additional communication channels, making it more complex, in order to assure quality
levels of the project. What will be the first project management document that Smith should change in order to
accommodate additional communication channels?
Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?
A bastion host should be placed:
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.
The performance quality audit activity is done in what project management process group?
Which of the following controls is MOST critical for protecting Artificial Intelligence (AI) systems?
At which point should the identity access management team be notified of the termination of an employee?
When managing the security architecture for your company you must consider:
Which of the following is true regarding expenditures?
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
Which of the following is the BEST reason for CISO collaboration with legal, IT, and core business functions?
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system’s scalability. This demonstrates which of the following?
Due to staff shortages during off-hours, the Security Operations Center (SOC) manager is considering outsourcing off-hour coverage. What type of SOC is being considered?
When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?
The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:
The Information Security Management program MUST protect:
Which of the following information would MOST likely be reported at the board-level within an organization?
Most of your security projects are behind schedule and over budget, but they align with the security program goals and are correctly scoped. What should you do next?
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
What is a difference from the list below between quantitative and qualitative Risk Assessment?
What is the purpose of International Organization for Standardization (ISO) 27002?
Why is it vitally important that senior management endorse a security policy?
Which of the following is considered a project versus a managed process?
What would be the MOST likely reason a CISO sees abnormally high volumes of security exceptions within a number of business functions?
When information security falls under the Chief Information Officer (CIO), what is their MOST essential role?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
What oversight should the information security team have in the change management process for application security?
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
The executive board has requested that the CISO define Key Performance Indicators (KPIs) to measure the effectiveness of the security awareness program. Which information would be MOST useful?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
Which of the following are primary concerns for management with regard to assessing internal control objectives?
When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?
What is a critical initial step when creating a Business Continuity Plan (BCP)?
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
Using the Transport Layer Security (TLS) protocol enables a client in a network to be:
Which of the following is critical in creating a security program aligned with an organization’s goals?
What is meant by password aging?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
A security team member calls you to inform you that one of your databases might have been compromised, but there are no details available. As the security leader, what should you do?
The ultimate goal of an IT security projects is:
Which technology can provide a computing environment without requiring a dedicated hardware backend?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
What is the relationship between information protection and regulatory compliance?
What is protected by Federal Information Processing Standards (FIPS) 140-2?
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
What two methods are used to assess risk impact?
A method to transfer risk is to:
Which of the following would BEST provide a comprehensive, independent, and certifiable perspective of security controls in an environment?
When choosing a risk mitigation method what is the MOST important factor?
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?
The process of identifying and classifying assets is typically included in the
Which of the following are NOT within the responsibilities of a CISO?
You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?
Which of the following is considered one of the most frequent failures in project management?
What is the BEST approach for managing shared elements from multiple regulations and standards?
A business unit within your organization intends to deploy a new technology in violation of information security standards. As a security leader, what would be your BEST course of action?
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
What Enterprise Architecture Framework is business-centric and is composed of eight phases?
A CISO has implemented a risk management capability within the security portfolio. Which of the following
terms best describes this functionality?
Which of the following information may be found in table top exercises for incident response?
Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?
Which of the following are the triple constraints of project management?
Which of the following has the GREATEST impact on the implementation of an information security governance model?
Which of the following backup sites takes the longest recovery time?
The rate of change in technology increases the importance of:
How often should the SSAE16 report of your vendors be reviewed?
Risk that remains after risk mitigation is known as
Which of the following results would have the MOST significant negative effect on an organization's external market image?
If a Virtual Machine’s (VM) data is being replicated and that data is corrupted, this corruption will automatically
be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?
Risk is defined as:
What standard provides a framework for information security risk management?
The Health Insurance Portability and Accountability Act (HIPAA) requires an agreement between Cloud Service Providers (CCSP) and the covered entity. Based on HIPAA. which document must be completed between the covered entity and the CCSP?
Which International Organization for Standardization (ISO) below BEST describes the performance of risk management, and includes a five-stage risk management methodology.
Which of the following governs the manner in which users and systems communicate and engage with other systems and resources?
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
The organization has already been subject to a significant amount of credit card fraud. Which of the following is the MOST likely reason for this fraud?
Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.
Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
Which of the following illustrates an operational control process:
In defining a strategic security plan for an organization, what should a CISO first analyze?
Many successful cyber-attacks currently include:
What is the MOST important result of the management response within the audit process?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
Which of the following BEST describes revenue?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Which of the following is an example of risk transference?
Which of the following illustrates an operational control?
Which of the following is NOT an approach for ethical decision making?
Which of the following provides an audit framework?
You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following provides the BEST software risk remediation methods?
Which of the following is critical for maintaining a successful information security management program?
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your employer?
Controls that were implemented to correct prior audit findings are insufficient. Before adjusting controls, what original document should be reviewed?
You assess the corporate culture and determine there is a pervasive opinion that the security program limits business performance. What is the MOST effective approach to reshape corporate culture to adopt security as a norm?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
Which of the following is the MOST effective method for discovering common technical vulnerabilities within the
IT environment?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
The PRIMARY objective of security awareness is to:
Which of the following MOST heavily influences the information security governance model?
What is the first action taken when reacting to a malware attack?
A security project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
Credit card information, medical data, and government records are all examples of:
What are the primary reasons for the development of a business case for a security project?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
What is the MOST important reason to have senior leadership endorse security policies?
Which of the following strategies provides the BEST response to a ransomware attack?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
Physical security measures typically include which of the following types of controls?
What is the difference between a quantitative and qualitative risk assessment?
Which of the following terms is used to describe the unexpected expansion of project deliverables?
When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
Which of the following best describes revenue?
Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?
The primary responsibility for assigning entitlements to a network share lies with which role?
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
Which of the following metrics would be MOST effective for measuring the effectiveness of a newly implemented change control process?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
Which of the following are not stakeholders of IT security projects?
Which of the following is a weakness of an asset or group of assets that can be exploited by one or more threats?
A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is looking to a strategy where attackers are lured into a zone of a safe network where attackers can be monitored, controlled, quarantined, or eradicated.
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Your Corporate Information Security Policy should include which of the following?
What is the MAIN reason for conflicts between Information Technology and Information Security programs?
The FIRST step in establishing a security governance program is to?
Which of the following is the MOST critical step when establishing a security governance program?
What standard provides a framework for information security risk management within organizations?
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
Which is the single MOST important factor for introducing digital evidence into a court of law?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
What is a key goal of information security?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
If your organization operates under a model of "assumption of breach", you should:
What type of control is used when assigning information assurance requirements to an independent security group?
When analyzing and forecasting a capital expense budget what are not included?
Which of the following intellectual Property components is focused on maintaining brand recognition?
What are the common data hiding techniques used by criminals?
What will a CISO analyze if she wants to understand the MOST current financial status of the organization?
Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?