ECCouncil 712-50 Practice Test - Questions Answers, Page 11
List of questions
Question 101
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
Question 102
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
Question 103
The amount of risk an organization is willing to accept in pursuit of its mission is known as
Question 104
Which of the following is a fundamental component of an audit record?
Question 105
Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?
Question 106
Which of the following is a benefit of a risk-based approach to audit planning?
Question 107
Dataflow diagrams are used by IT auditors to:
Question 108
During the course of a risk analysis your IT auditor identified threats and potential impacts. Next, your IT auditor should:
Question 109
Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement's requirement for uptime?
Question 110
IT control objectives are useful to IT auditors as they provide the basis for understanding the:
Question