Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

712-50 Exam Dumps - ECCouncil CCISO Questions and Answers

Question # 94

Which of the following defines the boundaries and scope of a risk assessment?

Options:

A.

The risk assessment schedule

B.

The risk assessment framework

C.

The risk assessment charter

D.

The assessment context

Buy Now
Question # 95

If the result of an NPV is positive, then the project should be selected. The net present value shows the present

value of the project, based on the decisions taken for its selection. What is the net present value equal to?

Options:

A.

Net profit – per capita income

B.

Total investment – Discounted cash

C.

Average profit – Annual investment

D.

Initial investment – Future value

Buy Now
Question # 96

What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

Options:

A.

Only IDS is susceptible to false positives

B.

An IPS examines network traffic flows to detect and actively stop exploits and attacks

C.

IPS identify potentially malicious traffic based on signature or behavior and IDS does not

D.

IDS are typically deployed behind the firewall and IPS are deployed in front of the firewall

Buy Now
Question # 97

Which business stakeholder is accountable for the integrity of a new information system?

Options:

A.

CISO

B.

Compliance Officer

C.

Project manager

D.

Board of directors

Buy Now
Question # 98

Which of the following are necessary to formulate responses to external audit findings?

Options:

A.

Internal Audit, Management, and Technical Staff

B.

Internal Audit, Budget Authority, Management

C.

Technical Staff, Budget Authority, Management

D.

Technical Staff, Internal Audit, Budget Authority

Buy Now
Question # 99

Which of the following BEST describes an international standard framework that is based on the security model Information Technology—Code of Practice for Information Security Management?

Options:

A.

International Organization for Standardization 27001

B.

National Institute of Standards and Technology Special Publication SP 800-12

C.

Request For Comment 2196

D.

National Institute of Standards and Technology Special Publication SP 800-26

Buy Now
Question # 100

A CISO has implemented a risk management capability within the security portfolio. Which of the following

terms best describes this functionality?

Options:

A.

Service

B.

Program

C.

Portfolio

D.

Cost center

Buy Now
Question # 101

Which of the following uses encapsulation and encryption?

Options:

A.

Virtual Private Network (VPN)

B.

Virtual Local Area Network (VLAN)

C.

File Transfer Protocol (FTP)

D.

Simple Mail Transfer Protocol (SMTP)

Buy Now
Question # 102

What Enterprise Architecture Framework is business-centric and is composed of eight phases?

Options:

A.

Federal Enterprise Architecture

B.

The Open Group Architecture Framework (TOGAF)

C.

Zochman

D.

Sherwood Applied Business Security Architecture

Buy Now
Question # 103

During an initial investigation, the Incident Response Team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical action they should take?

Options:

A.

Preservation of evidence

B.

Constant communication of status to executives

C.

Eradication of malware and system restoration

D.

Determination of the attack source

Buy Now
Question # 104

When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?

Options:

A.

Configurations and software patch level

B.

Unallocated system storage and removable drives

C.

Persistent and volatile data

D.

Screen captures and keystroke logs

Buy Now
Question # 105

Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?

Options:

A.

Senior Executives

B.

Office of the Auditor

C.

Office of the General Counsel

D.

All employees and users

Buy Now
Question # 106

What is the next step after defining the conditions under which standard security controls must be applied?

Options:

A.

Perform an asset inventory and apply classifications

B.

Analyze future security control plans

C.

Adopt a culture of risk awareness

D.

Create risk mitigation plans

Buy Now
Question # 107

Which of the following is the MOST effective technology to counter phishing attacks?

Options:

A.

Vulnerability scanning software

B.

Additional monitoring of low-risk individuals

C.

Email anti-spam solutions

D.

Email antivirus solutions

Buy Now
Question # 108

Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?

Options:

A.

Poses a strong technical background

B.

Understand all regulations affecting the organization

C.

Understand the business goals of the organization

D.

Poses a strong auditing background

Buy Now
Exam Code: 712-50
Exam Name: EC-Council Certified CISO (CCISO)
Last Update: Feb 4, 2026
Questions: 494
712-50 pdf

712-50 PDF

$29.75  $84.99
712-50 Engine

712-50 Testing Engine

$33.25  $94.99
712-50 PDF + Engine

712-50 PDF + Testing Engine

$47.25  $134.99