EC-Council 712-50 EC-Council Certified CISO (CCISO) Online Training
EC-Council 712-50 Online Training
The questions for 712-50 were last updated at Feb 20,2025.
- Exam Code: 712-50
- Exam Name: EC-Council Certified CISO (CCISO)
- Certification Provider: EC-Council
- Latest update: Feb 20,2025
What two methods are used to assess risk impact?
- A . Cost and annual rate of expectance
- B . Subjective and Objective
- C . Qualitative and percent of loss realized
- D . Quantitative and qualitative
What is the definition of Risk in Information Security?
- A . Risk = Probability x Impact
- B . Risk = Threat x Probability
- C . Risk = Financial Impact x Probability
- D . Risk = Impact x Threat
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
- A . Due Protection
- B . Due Care
- C . Due Compromise
- D . Due process
A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure .
What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
- A . Scan a representative sample of systems
- B . Perform the scans only during off-business hours
- C . Decrease the vulnerabilities within the scan tool settings
- D . Filter the scan output so only pertinent data is analyzed
Who is responsible for securing networks during a security incident?
- A . Chief Information Security Officer (CISO)
- B . Security Operations Center (SO
- C . Disaster Recovery (DR) manager
- D . Incident Response Team (IRT)
Which of the following is the MOST important benefit of an effective security governance process?
- A . Reduction of liability and overall risk to the organization
- B . Better vendor management
- C . Reduction of security breaches
- D . Senior management participation in the incident response process
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
- A . National Institute for Standards and Technology 800-50 (NIST 800-50)
- B . International Organization for Standardizations C 27005 (ISO-27005)
- C . Payment Card Industry Data Security Standards (PCI-DSS)
- D . International Organization for Standardizations C 27004 (ISO-27004)
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
- A . Detective Controls
- B . Proactive Controls
- C . Preemptive Controls
- D . Organizational Controls
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
- A . Plan-Check-Do-Act
- B . Plan-Do-Check-Act
- C . Plan-Select-Implement-Evaluate
- D . SCORE (Security Consensus Operational Readiness Evaluation)
To have accurate and effective information security policies how often should the CISO review the organization policies?
- A . Every 6 months
- B . Quarterly
- C . Before an audit
- D . At least once a year