Free 712-50 Exam Braindumps

Pass your EC-Council Certified CISO (CCISO) exam with these free Questions and Answers

Page 7 of 90
QUESTION 26

- (Topic 1)
Credit card information, medical data, and government records are all examples of:

  1. A. Confidential/Protected Information
  2. B. Bodily Information
  3. C. Territorial Information
  4. D. Communications Information

Correct Answer: A

QUESTION 27

- (Topic 3)
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?

  1. A. Poor audit support for the security program
  2. B. A lack of executive presence within the security program
  3. C. Poor alignment of the security program to business needs
  4. D. This is normal since business units typically resist security requirements

Correct Answer: C

QUESTION 28

- (Topic 2)
A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?

  1. A. The auditors have not followed proper auditing processes
  2. B. The CIO of the organization disagrees with the finding
  3. C. The risk tolerance of the organization permits this risk
  4. D. The organization has purchased cyber insurance

Correct Answer: C

QUESTION 29

- (Topic 4)
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

  1. A. Traffic Analysis
  2. B. Deep-Packet inspection
  3. C. Packet sampling
  4. D. Heuristic analysis

Correct Answer: B

QUESTION 30

- (Topic 1)
What is the relationship between information protection and regulatory compliance?

  1. A. That all information in an organization must be protected equally.
  2. B. The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
  3. C. That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
  4. D. There is no relationship between the two.

Correct Answer: C

Page 7 of 90

Post your Comments and Discuss EC-Council 712-50 exam with other Community members: