712-50試験無料問題集「EC-COUNCIL EC-Council Certified CISO (CCISO) 認定」

The primary purpose of a risk register is to:

解説: (GoShiken メンバーにのみ表示されます)
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?

解説: (GoShiken メンバーにのみ表示されます)
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization's

解説: (GoShiken メンバーにのみ表示されます)
The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called

解説: (GoShiken メンバーにのみ表示されます)
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?

解説: (GoShiken メンバーにのみ表示されます)
As the CISO, you have been tasked with the execution of the company's key management program. You MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key control will ensure no single individual can constitute or re-constitute a key?

解説: (GoShiken メンバーにのみ表示されます)
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?

解説: (GoShiken メンバーにのみ表示されます)
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?

解説: (GoShiken メンバーにのみ表示されます)
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has implemented remediation activities. Which of the following is the MOST logical next step?

解説: (GoShiken メンバーにのみ表示されます)
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?

解説: (GoShiken メンバーにのみ表示されます)
To have accurate and effective information security policies how often should the CISO review the organization policies?

解説: (GoShiken メンバーにのみ表示されます)
Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18 members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit team, the project manager is convinced to add a quality professional to lead to test team at additional cost to the project.
The project manager is aware of the importance of communication for the success of the project and takes the step of introducing additional communication channels, making it more complex, in order to assure quality levels of the project. What will be the first project management document that Smith should change in order to accommodate additional communication channels?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is the BEST indicator of a successful project?

解説: (GoShiken メンバーにのみ表示されます)