ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:

A.
Detective Controls
A.
Detective Controls
Answers
B.
Proactive Controls
B.
Proactive Controls
Answers
C.
Preemptive Controls
C.
Preemptive Controls
Answers
D.
Organizational Controls
D.
Organizational Controls
Answers
Suggested answer: D

The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team.

This is consider a bad practice MAINLY because

A.
The IT team is not familiar in IT audit practices
A.
The IT team is not familiar in IT audit practices
Answers
B.
This represents a bad implementation of the Least Privilege principle
B.
This represents a bad implementation of the Least Privilege principle
Answers
C.
This represents a conflict of interest
C.
This represents a conflict of interest
Answers
D.
The IT team is not certified to perform audits
D.
The IT team is not certified to perform audits
Answers
Suggested answer: C

The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is

A.
Penetration testers
A.
Penetration testers
Answers
B.
External Audit
B.
External Audit
Answers
C.
Internal Audit
C.
Internal Audit
Answers
D.
Forensic experts
D.
Forensic experts
Answers
Suggested answer: B

An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization's IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:

A.
Number of change orders rejected
A.
Number of change orders rejected
Answers
B.
Number and length of planned outages
B.
Number and length of planned outages
Answers
C.
Number of unplanned outages
C.
Number of unplanned outages
Answers
D.
Number of change orders processed
D.
Number of change orders processed
Answers
Suggested answer: C

Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?

A.
Perform a vulnerability scan of the network
A.
Perform a vulnerability scan of the network
Answers
B.
External penetration testing by a qualified third party
B.
External penetration testing by a qualified third party
Answers
C.
Internal Firewall ruleset reviews
C.
Internal Firewall ruleset reviews
Answers
D.
Implement network intrusion prevention systems
D.
Implement network intrusion prevention systems
Answers
Suggested answer: B

Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?

A.
Security Administrators
A.
Security Administrators
Answers
B.
Internal/External Audit
B.
Internal/External Audit
Answers
C.
Risk Management
C.
Risk Management
Answers
D.
Security Operations
D.
Security Operations
Answers
Suggested answer: B

A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?

A.
The auditors have not followed proper auditing processes
A.
The auditors have not followed proper auditing processes
Answers
B.
The CIO of the organization disagrees with the finding
B.
The CIO of the organization disagrees with the finding
Answers
C.
The risk tolerance of the organization permits this risk
C.
The risk tolerance of the organization permits this risk
Answers
D.
The organization has purchased cyber insurance
D.
The organization has purchased cyber insurance
Answers
Suggested answer: C

The remediation of a specific audit finding is deemed too expensive and will not be implemented.

Which of the following is a TRUE statement?

A.
The asset is more expensive than the remediation
A.
The asset is more expensive than the remediation
Answers
B.
The audit finding is incorrect
B.
The audit finding is incorrect
Answers
C.
The asset being protected is less valuable than the remediation costs
C.
The asset being protected is less valuable than the remediation costs
Answers
D.
The remediation costs are irrelevant; it must be implemented regardless of cost.
D.
The remediation costs are irrelevant; it must be implemented regardless of cost.
Answers
Suggested answer: C

A missing/ineffective security control is identified. Which of the following should be the NEXT step?

A.
Perform an audit to measure the control formally
A.
Perform an audit to measure the control formally
Answers
B.
Escalate the issue to the IT organization
B.
Escalate the issue to the IT organization
Answers
C.
Perform a risk assessment to measure risk
C.
Perform a risk assessment to measure risk
Answers
D.
Establish Key Risk Indicators
D.
Establish Key Risk Indicators
Answers
Suggested answer: C

The risk found after a control has been fully implemented is called:

A.
Residual Risk
A.
Residual Risk
Answers
B.
Total Risk
B.
Total Risk
Answers
C.
Post implementation risk
C.
Post implementation risk
Answers
D.
Transferred risk
D.
Transferred risk
Answers
Suggested answer: A
Total 460 questions
Go to page: of 46