EC-Council 712-50 EC-Council Certified CISO (CCISO) Online Training
EC-Council 712-50 Online Training
The questions for 712-50 were last updated at Feb 20,2025.
- Exam Code: 712-50
- Exam Name: EC-Council Certified CISO (CCISO)
- Certification Provider: EC-Council
- Latest update: Feb 20,2025
What is the relationship between information protection and regulatory compliance?
- A . That all information in an organization must be protected equally.
- B . The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
- C . That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
- D . There is no relationship between the two.
You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?
- A . Chief Information Security Officer
- B . Chief Executive Officer
- C . Chief Information Officer
- D . Chief Legal Counsel
A method to transfer risk is to:
- A . Implement redundancy
- B . move operations to another region
- C . purchase breach insurance
- D . Alignment with business operations
The Information Security Governance program MUST:
- A . integrate with other organizational governance processes
- B . support user choice for Bring Your Own Device (BYOD)
- C . integrate with other organizational governance processes
- D . show a return on investment for the organization
When managing the security architecture for your company you must consider:
- A . Security and IT Staff size
- B . Company Values
- C . Budget
- D . All of the above
What is a difference from the list below between quantitative and qualitative Risk Assessment?
- A . Quantitative risk assessments result in an exact number (in monetary terms)
- B . Qualitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
- C . Qualitative risk assessments map to business objectives
- D . Quantitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
One of the MAIN goals of a Business Continuity Plan is to
- A . Ensure all infrastructure and applications are available in the event of a disaster
- B . Allow all technical first-responders to understand their roles in the event of a disaster
- C . Provide step by step plans to recover business processes in the event of a disaster
- D . Assign responsibilities to the technical teams responsible for the recovery of all data.
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for
- A . Confidentiality, Integrity and Availability
- B . Assurance, Compliance and Availability
- C . International Compliance
- D . Integrity and Availability
Which of the following is the MOST important for a CISO to understand when identifying threats?
- A . How vulnerabilities can potentially be exploited in systems that impact the organization
- B . How the security operations team will behave to reported incidents
- C . How the firewall and other security devices are configured to prevent attacks
- D . How the incident management team prepares to handle an attack
What is the MAIN reason for conflicts between Information Technology and Information Security programs?
- A . Technology governance defines technology policies and standards while security governance does not.
- B . Security governance defines technology best practices and Information Technology governance does not.
- C . Technology Governance is focused on process risks whereas Security Governance is focused on business risk.
- D . The effective implementation of security controls can be viewed as an inhibitor to rapid Information Technology implementations.