EC-Council 712-50 EC-Council Certified CISO (CCISO) Online Training
EC-Council 712-50 Online Training
The questions for 712-50 were last updated at Dec 25,2024.
- Exam Code: 712-50
- Exam Name: EC-Council Certified CISO (CCISO)
- Certification Provider: EC-Council
- Latest update: Dec 25,2024
Which of the following provides an audit framework?
- A . Control Objectives for IT (COBIT)
- B . Payment Card Industry-Data Security Standard (PCI-DSS)
- C . International Organization Standard (ISO) 27002
- D . National Institute of Standards and Technology (NIST) SP 800-30
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
- A . information security metrics.
- B . knowledge required to analyze each issue.
- C . baseline against which metrics are evaluated.
- D . linkage to business area objectives.
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
- A . High risk environments 6 months, low risk environments 12 months
- B . Every 12 months
- C . Every 18 months
- D . Every six months
What is the main purpose of the Incident Response Team?
- A . Ensure efficient recovery and reinstate repaired systems
- B . Create effective policies detailing program activities
- C . Communicate details of information security incidents
- D . Provide current employee awareness programs
A global health insurance company is concerned about protecting confidential information .
Which of the following is of MOST concern to this organization?
- A . Compliance to the Payment Card Industry (PCI) regulations.
- B . Alignment with financial reporting regulations for each country where they operate.
- C . Alignment with International Organization for Standardization (ISO) standards.
- D . Compliance with patient data protection regulations for each country where they operate.
The PRIMARY objective for information security program development should be:
- A . Reducing the impact of the risk to the business.
- B . Establishing strategic alignment with bunsiness continuity requirements
- C . Establishing incident response programs.
- D . Identifying and implementing the best security solutions.
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards .
What immediate action should the information security manager take?
- A . Enforce the existing security standards and do not allow the deployment of the new technology.
- B . Amend the standard to permit the deployment.
- C . If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.
- D . Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
- A . In promiscuous mode and only detect malicious traffic.
- B . In-line and turn on blocking mode to stop malicious traffic.
- C . In promiscuous mode and block malicious traffic.
- D . In-line and turn on alert mode to stop malicious traffic.
An organization information security policy serves to
- A . establish budgetary input in order to meet compliance requirements
- B . establish acceptable systems and user behavior
- C . define security configurations for systems
- D . define relationships with external law enforcement agencies
Which of the following has the GREATEST impact on the implementation of an information security governance model?
- A . Organizational budget
- B . Distance between physical locations
- C . Number of employees
- D . Complexity of organizational structure