EC-Council 712-50 Practice Exams
Last updated on Apr 06,2025- Exam Code: 712-50
- Exam Name: EC-Council Certified CISO (CCISO)
- Certification Provider: EC-Council
- Latest update: Apr 06,2025
The success of the Chief Information Security Officer is MOST dependent upon:
- A . favorable audit findings
- B . following the recommendations of consultants and contractors
- C . development of relationships with organization executives
- D . raising awareness of security issues with end users
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
- A . Public cloud
- B . Private cloud
- C . Community cloud
- D . Hybrid cloud
As the Chief Information Security Officer, you are performing an assessment of security posture to understand what your Defense-in-Depth capabilities are.
Which network security technology examines network traffic flows to detect and actively stop vulnerability exploits and attacks?
- A . Gigamon
- B . Intrusion Prevention System
- C . Port Security
- D . Anti-virus
What is a difference from the list below between quantitative and qualitative Risk Assessment?
- A . Quantitative risk assessments result in an exact number (in monetary terms)
- B . Qualitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
- C . Qualitative risk assessments map to business objectives
- D . Quantitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
Payment Card Industry (PCI) compliance requirements are based on what criteria?
- A . The types of cardholder data retained
- B . The duration card holder data is retained
- C . The size of the organization processing credit card data
- D . The number of transactions performed per year by an organization
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units.
Which of the following standards and guidelines can BEST address this organization’s need?
- A . International Organization for Standardizations C 22301 (ISO-22301)
- B . Information Technology Infrastructure Library (ITIL)
- C . Payment Card Industry Data Security Standards (PCI-DSS)
- D . International Organization for Standardizations C 27005 (ISO-27005)
Which of the following are the triple constraints of project management?
- A . Time, quality, and scope
- B . Cost, quality, and time
- C . Scope, time, and cost
- D . Quality, scope, and cost
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
- A . ‘ o 1=1 – –
- B . /../../../../
- C . “DROPTABLE USERNAME”
- D . NOPS
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
- A . Controlled spear phishing campaigns
- B . Password changes
- C . Baselining of computer systems
- D . Scanning for viruses
What is a Statement of Objectives (SOA)?
- A . A section of a contract that defines tasks to be performed under said contract
- B . An outline of what the military will do during war
- C . A document that outlines specific desired outcomes as part of a request for proposal
- D . Business guidance provided by the CEO