ECCouncil 712-50 Practice Test - Questions Answers, Page 11

List of questions
Question 101

The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
Question 102

An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
Question 103

The amount of risk an organization is willing to accept in pursuit of its mission is known as
Question 104

Which of the following is a fundamental component of an audit record?
Question 105

Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?
Question 106

Which of the following is a benefit of a risk-based approach to audit planning?
Question 107

Dataflow diagrams are used by IT auditors to:
Question 108

During the course of a risk analysis your IT auditor identified threats and potential impacts. Next, your IT auditor should:
Question 109

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement's requirement for uptime?
Question 110

IT control objectives are useful to IT auditors as they provide the basis for understanding the:
Question