EC-Council 712-50 EC-Council Certified CISO (CCISO) Online Training
EC-Council 712-50 Online Training
The questions for 712-50 were last updated at Feb 18,2025.
- Exam Code: 712-50
- Exam Name: EC-Council Certified CISO (CCISO)
- Certification Provider: EC-Council
- Latest update: Feb 18,2025
The PRIMARY objective of security awareness is to:
- A . Ensure that security policies are read.
- B . Encourage security-conscious employee behavior.
- C . Meet legal and regulatory requirements.
- D . Put employees on notice in case follow-up action for noncompliance is necessary
Regulatory requirements typically force organizations to implement
- A . Mandatory controls
- B . Discretionary controls
- C . Optional controls
- D . Financial controls
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
- A . Determine appetite
- B . Evaluate risk avoidance criteria
- C . Perform a risk assessment
- D . Mitigate risk
Which of the following is a critical operational component of an Incident Response Program (IRP)?
- A . Weekly program budget reviews to ensure the percentage of program funding remains constant.
- B . Annual review of program charters, policies, procedures and organizational agreements.
- C . Daily monitoring of vulnerability advisories relating to your organization’s deployed technologies.
- D . Monthly program tests to ensure resource allocation is sufficient for supporting the needs of the organization
When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
- A . The asset owner
- B . The asset manager
- C . The data custodian
- D . The project manager
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
- A . How many credit card records are stored?
- B . How many servers do you have?
- C . What is the scope of the certification?
- D . What is the value of the assets at risk?
Which of the following intellectual Property components is focused on maintaining brand recognition?
- A . Trademark
- B . Patent
- C . Research Logs
- D . Copyright
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
- A . They are objective and can express risk / cost in real numbers
- B . They are subjective and can be completed more quickly
- C . They are objective and express risk / cost in approximates
- D . They are subjective and can express risk /cost in real numbers
Developing effective security controls is a balance between:
- A . Risk Management and Operations
- B . Corporate Culture and Job Expectations
- C . Operations and Regulations
- D . Technology and Vendor Management
The alerting, monitoring and life-cycle management of security related events is typically handled by the
- A . security threat and vulnerability management process
- B . risk assessment process
- C . risk management process
- D . governance, risk, and compliance tools