Which of the following represents the best method of ensuring business unit alignment with security program requirements?
A. Create collaborative risk management approaches within the organization
B. Perform increased audits of security processes and procedures
C. Provide clear communication of security requirements throughout the organization
D. Demonstrate executive support with written mandates for security policy adherence
When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization.
Which example below is the MOST creative way to maintain a strong security posture during these difficult times?
A. Download security tools from a trusted source and deploy to production network
B. Download open source security tools from a trusted site, test, and then deploy on production network
C. Download trial versions of commercially available security tools and deploy on your production network
D. Download open source security tools and deploy them on your production network
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat.
This is an example of:
A. Change management
B. Thought leadership
C. Business continuity planning
D. Security Incident Response
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll.
Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff?
A. Employ an assumption of breach protocol and defend only essential information resources.
B. Deploy a SEIM solution and have current staff review incidents first in the morning
C. Configure your syslog to send SMS messages to current staff when target events are triggered.
D. Contract with a managed security provider and have current staff on recall for incident response
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims.
Which of the following vendor provided documents is BEST to make your decision?
A. Vendor provided reference from an existing reputable client detailing their implementation
B. Vendor's client list of reputable organizations currently using their solution
C. Vendor provided internal risk assessment and security control documentation
D. Vendor provided attestation of the detailed security controls from a reputable accounting firm
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement.
What type of risk tolerance is Acme exhibiting?
A. medium-high risk-tolerance
B. low risk-tolerance
C. high risk-tolerance
D. moderate risk-tolerance
Your incident response plan should include which of the following?
A. Procedures for classification
B. Procedures for charge-back
C. Procedures for reclamation
D. Procedures for litigation
To get an Information Security project back on schedule, which of the following will provide the MOST help?
A. Upper management support
B. More frequent project milestone meetings
C. Stakeholder support
D. None
E. Extend work hours
Which of the following are necessary to formulate responses to external audit findings?
A. Technical Staff, Budget Authority, Management
B. Technical Staff, Internal Audit, Budget Authority
C. Internal Audit, Budget Authority, Management
D. Internal Audit, management, and Technical Staff
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?
A. Implementation of business-enabling information security
B. Use within an organization to ensure compliance with laws and regulations
C. To enable organizations that adopt it to obtain certifications
D. Use within an organization to formulate security requirements and objectives
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 712-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.