EC-Council 712-50 EC-Council Certified CISO (CCISO) Online Training
EC-Council 712-50 Online Training
The questions for 712-50 were last updated at Feb 20,2025.
- Exam Code: 712-50
- Exam Name: EC-Council Certified CISO (CCISO)
- Certification Provider: EC-Council
- Latest update: Feb 20,2025
The single most important consideration to make when developing your security program, policies, and processes is:
- A . Budgeting for unforeseen data compromises
- B . Streamlining for efficiency
- C . Alignment with the business
- D . Establishing your authority as the Security Executive
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
- A . Strong authentication technologies
- B . Financial reporting regulations
- C . Credit card compliance and regulations
- D . Local privacy laws
When dealing with a risk management process, asset classification is important because it will impact the overall:
- A . Threat identification
- B . Risk monitoring
- C . Risk treatment
- D . Risk tolerance
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
- A . Susceptibility to attack, mitigation response time, and cost
- B . Attack vectors, controls cost, and investigation staffing needs
- C . Vulnerability exploitation, attack recovery, and mean time to repair
- D . Susceptibility to attack, expected duration of attack, and mitigation availability
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units .
Which of the following standards and guidelines can BEST address this organization’s need?
- A . International Organization for Standardizations C 22301 (ISO-22301)
- B . Information Technology Infrastructure Library (ITIL)
- C . Payment Card Industry Data Security Standards (PCI-DSS)
- D . International Organization for Standardizations C 27005 (ISO-27005)
Who in the organization determines access to information?
- A . Legal department
- B . Compliance officer
- C . Data Owner
- D . Information security officer
The FIRST step in establishing a security governance program is to?
- A . Conduct a risk assessment.
- B . Obtain senior level sponsorship.
- C . Conduct a workshop for all end users.
- D . Prepare a security budget.
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
- A . Security officer
- B . Data owner
- C . Vulnerability engineer
- D . System administrator
The establishment of a formal risk management framework and system authorization program is essential.
The LAST step of the system authorization process is:
- A . Contacting the Internet Service Provider for an IP scope
- B . Getting authority to operate the system from executive management
- C . Changing the default passwords
- D . Conducting a final scan of the live system and mitigating all high and medium level vulnerabilities
Information security policies should be reviewed:
- A . by stakeholders at least annually
- B . by the CISO when new systems are brought online
- C . by the Incident Response team after an audit
- D . by internal audit semiannually