ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?

A.
Organization control
A.
Organization control
Answers
B.
Procedural control
B.
Procedural control
Answers
C.
Management control
C.
Management control
Answers
D.
Technical control
D.
Technical control
Answers
Suggested answer: D

An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security

A.
Procedural control
A.
Procedural control
Answers
B.
Management control
B.
Management control
Answers
C.
Technical control
C.
Technical control
Answers
D.
Administrative control
D.
Administrative control
Answers
Suggested answer: B

The amount of risk an organization is willing to accept in pursuit of its mission is known as

A.
Risk mitigation
A.
Risk mitigation
Answers
B.
Risk transfer
B.
Risk transfer
Answers
C.
Risk tolerance
C.
Risk tolerance
Answers
D.
Risk acceptance
D.
Risk acceptance
Answers
Suggested answer: C

Which of the following is a fundamental component of an audit record?

A.
Date and time of the event
A.
Date and time of the event
Answers
B.
Failure of the event
B.
Failure of the event
Answers
C.
Originating IP-Address
C.
Originating IP-Address
Answers
D.
Authentication type
D.
Authentication type
Answers
Suggested answer: A

Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?

A.
Lack of notification to the public of disclosure of confidential information.
A.
Lack of notification to the public of disclosure of confidential information.
Answers
B.
Lack of periodic examination of access rights
B.
Lack of periodic examination of access rights
Answers
C.
Failure to notify police of an attempted intrusion
C.
Failure to notify police of an attempted intrusion
Answers
D.
Lack of reporting of a successful denial of service attack on the network.
D.
Lack of reporting of a successful denial of service attack on the network.
Answers
Suggested answer: A

Which of the following is a benefit of a risk-based approach to audit planning?

A.
Resources are allocated to the areas of the highest concern
A.
Resources are allocated to the areas of the highest concern
Answers
B.
Scheduling may be performed months in advance
B.
Scheduling may be performed months in advance
Answers
C.
Budgets are more likely to be met by the IT audit staff
C.
Budgets are more likely to be met by the IT audit staff
Answers
D.
Staff will be exposed to a variety of technologies
D.
Staff will be exposed to a variety of technologies
Answers
Suggested answer: A

Dataflow diagrams are used by IT auditors to:

A.
Order data hierarchically.
A.
Order data hierarchically.
Answers
B.
Highlight high-level data definitions.
B.
Highlight high-level data definitions.
Answers
C.
Graphically summarize data paths and storage processes.
C.
Graphically summarize data paths and storage processes.
Answers
D.
Portray step-by-step details of data generation.
D.
Portray step-by-step details of data generation.
Answers
Suggested answer: C

During the course of a risk analysis your IT auditor identified threats and potential impacts. Next, your IT auditor should:

A.
Identify and evaluate the existing controls.
A.
Identify and evaluate the existing controls.
Answers
B.
Disclose the threats and impacts to management.
B.
Disclose the threats and impacts to management.
Answers
C.
Identify information assets and the underlying systems.
C.
Identify information assets and the underlying systems.
Answers
D.
Identify and assess the risk assessment process used by management.
D.
Identify and assess the risk assessment process used by management.
Answers
Suggested answer: A

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement's requirement for uptime?

A.
Systems logs
A.
Systems logs
Answers
B.
Hardware error reports
B.
Hardware error reports
Answers
C.
Utilization reports
C.
Utilization reports
Answers
D.
Availability reports
D.
Availability reports
Answers
Suggested answer: D

IT control objectives are useful to IT auditors as they provide the basis for understanding the:

A.
Desired results or purpose of implementing specific control procedures.
A.
Desired results or purpose of implementing specific control procedures.
Answers
B.
The audit control checklist.
B.
The audit control checklist.
Answers
C.
Techniques for securing information.
C.
Techniques for securing information.
Answers
D.
Security policy
D.
Security policy
Answers
Suggested answer: A
Total 460 questions
Go to page: of 46