ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions











What is the BEST way to achieve on-going compliance monitoring in an organization?

A.
Only check compliance right before the auditors are scheduled to arrive onsite.
A.
Only check compliance right before the auditors are scheduled to arrive onsite.
Answers
B.
Outsource compliance to a 3rd party vendor and let them manage the program.
B.
Outsource compliance to a 3rd party vendor and let them manage the program.
Answers
C.
Have Compliance and Information Security partner to correct issues as they arise.
C.
Have Compliance and Information Security partner to correct issues as they arise.
Answers
D.
Have Compliance direct Information Security to fix issues after the auditors report.
D.
Have Compliance direct Information Security to fix issues after the auditors report.
Answers
Suggested answer: C

Which of the following is the MOST important for a CISO to understand when identifying threats?

A.
How vulnerabilities can potentially be exploited in systems that impact the organization
A.
How vulnerabilities can potentially be exploited in systems that impact the organization
Answers
B.
How the security operations team will behave to reported incidents
B.
How the security operations team will behave to reported incidents
Answers
C.
How the firewall and other security devices are configured to prevent attacks
C.
How the firewall and other security devices are configured to prevent attacks
Answers
D.
How the incident management team prepares to handle an attack
D.
How the incident management team prepares to handle an attack
Answers
Suggested answer: A

Which of the following are the MOST important factors for proactively determining system vulnerabilities?

A.
Subscribe to vendor mailing list to get notification of system vulnerabilities
A.
Subscribe to vendor mailing list to get notification of system vulnerabilities
Answers
B.
Deploy Intrusion Detection System (IDS) and install anti-virus on systems
B.
Deploy Intrusion Detection System (IDS) and install anti-virus on systems
Answers
C.
Configure firewall, perimeter router and Intrusion Prevention System (IPS)
C.
Configure firewall, perimeter router and Intrusion Prevention System (IPS)
Answers
D.
Conduct security testing, vulnerability scanning, and penetration testing
D.
Conduct security testing, vulnerability scanning, and penetration testing
Answers
Suggested answer: D

What role should the CISO play in properly scoping a PCI environment?

A.
Validate the business units' suggestions as to what should be included in the scoping process
A.
Validate the business units' suggestions as to what should be included in the scoping process
Answers
B.
Work with a Qualified Security Assessor (QSA) to determine the scope of the PCI environment
B.
Work with a Qualified Security Assessor (QSA) to determine the scope of the PCI environment
Answers
C.
Ensure internal scope validation is completed and that an assessment has been done to discover all credit card data
C.
Ensure internal scope validation is completed and that an assessment has been done to discover all credit card data
Answers
D.
Complete the self-assessment questionnaire and work with an Approved Scanning Vendor (ASV) to determine scope
D.
Complete the self-assessment questionnaire and work with an Approved Scanning Vendor (ASV) to determine scope
Answers
Suggested answer: C

What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?

A.
Test every three years to ensure that things work as planned
A.
Test every three years to ensure that things work as planned
Answers
B.
Conduct periodic tabletop exercises to refine the BC plan
B.
Conduct periodic tabletop exercises to refine the BC plan
Answers
C.
Outsource the creation and execution of the BC plan to a third party vendor
C.
Outsource the creation and execution of the BC plan to a third party vendor
Answers
D.
Conduct a Disaster Recovery (DR) exercise every year to test the plan
D.
Conduct a Disaster Recovery (DR) exercise every year to test the plan
Answers
Suggested answer: B

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

A.
Determine appetite
A.
Determine appetite
Answers
B.
Evaluate risk avoidance criteria
B.
Evaluate risk avoidance criteria
Answers
C.
Perform a risk assessment
C.
Perform a risk assessment
Answers
D.
Mitigate risk
D.
Mitigate risk
Answers
Suggested answer: D

According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?

A.
Susceptibility to attack, mitigation response time, and cost
A.
Susceptibility to attack, mitigation response time, and cost
Answers
B.
Attack vectors, controls cost, and investigation staffing needs
B.
Attack vectors, controls cost, and investigation staffing needs
Answers
C.
Vulnerability exploitation, attack recovery, and mean time to repair
C.
Vulnerability exploitation, attack recovery, and mean time to repair
Answers
D.
Susceptibility to attack, expected duration of attack, and mitigation availability
D.
Susceptibility to attack, expected duration of attack, and mitigation availability
Answers
Suggested answer: A

Explanation:

Topic 2, IS Management Controls and Auditing Management

Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?

A.
Single loss expectancy multiplied by the annual rate of occurrence
A.
Single loss expectancy multiplied by the annual rate of occurrence
Answers
B.
Total loss expectancy multiplied by the total loss frequency
B.
Total loss expectancy multiplied by the total loss frequency
Answers
C.
Value of the asset multiplied by the loss expectancy
C.
Value of the asset multiplied by the loss expectancy
Answers
D.
Replacement cost multiplied by the single loss expectancy
D.
Replacement cost multiplied by the single loss expectancy
Answers
Suggested answer: A

When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

A.
ISO 27001
A.
ISO 27001
Answers
B.
PRINCE2
B.
PRINCE2
Answers
C.
ISO 27004
C.
ISO 27004
Answers
D.
ITILv3
D.
ITILv3
Answers
Suggested answer: C

The regular review of a firewall ruleset is considered a

A.
Procedural control
A.
Procedural control
Answers
B.
Organization control
B.
Organization control
Answers
C.
Technical control
C.
Technical control
Answers
D.
Management control
D.
Management control
Answers
Suggested answer: A
Total 460 questions
Go to page: of 46