ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Related questions











In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?

A.
Internal Audit
A.
Internal Audit
Answers
B.
Database Administration
B.
Database Administration
Answers
C.
Information Security
C.
Information Security
Answers
D.
Compliance
D.
Compliance
Answers
Suggested answer: C

At which point should the identity access management team be notified of the termination of an employee?

A.
At the end of the day once the employee is off site
A.
At the end of the day once the employee is off site
Answers
B.
During the monthly review cycle
B.
During the monthly review cycle
Answers
C.
Immediately so the employee account(s) can be disabled
C.
Immediately so the employee account(s) can be disabled
Answers
D.
Before an audit
D.
Before an audit
Answers
Suggested answer: C

To have accurate and effective information security policies how often should the CISO review the organization policies?

A.
Every 6 months
A.
Every 6 months
Answers
B.
Quarterly
B.
Quarterly
Answers
C.
Before an audit
C.
Before an audit
Answers
D.
At least once a year
D.
At least once a year
Answers
Suggested answer: D

How often should an environment be monitored for cyber threats, risks, and exposures?

A.
Weekly
A.
Weekly
Answers
B.
Monthly
B.
Monthly
Answers
C.
Quarterly
C.
Quarterly
Answers
D.
Daily
D.
Daily
Answers
Suggested answer: D

Which is the BEST solution to monitor, measure, and report changes to critical data in a system?

A.
Application logs
A.
Application logs
Answers
B.
File integrity monitoring
B.
File integrity monitoring
Answers
C.
SNMP traps
C.
SNMP traps
Answers
D.
Syslog
D.
Syslog
Answers
Suggested answer: B

When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?

A.
Daily
A.
Daily
Answers
B.
Hourly
B.
Hourly
Answers
C.
Weekly
C.
Weekly
Answers
D.
Monthly
D.
Monthly
Answers
Suggested answer: A

Which represents PROPER separation of duties in the corporate environment?

A.
Information Security and Identity Access Management teams perform two distinct functions
A.
Information Security and Identity Access Management teams perform two distinct functions
Answers
B.
Developers and Network teams both have admin rights on servers
B.
Developers and Network teams both have admin rights on servers
Answers
C.
Finance has access to Human Resources data
C.
Finance has access to Human Resources data
Answers
D.
Information Security and Network teams perform two distinct functions
D.
Information Security and Network teams perform two distinct functions
Answers
Suggested answer: D

Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?

A.
Servers, routers, switches, modem
A.
Servers, routers, switches, modem
Answers
B.
Firewall, exchange, web server, intrusion detection system (IDS)
B.
Firewall, exchange, web server, intrusion detection system (IDS)
Answers
C.
Firewall, anti-virus console, IDS, syslog
C.
Firewall, anti-virus console, IDS, syslog
Answers
D.
IDS, syslog, router, switches
D.
IDS, syslog, router, switches
Answers
Suggested answer: C

Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?

A.
All vulnerabilities found on servers and desktops
A.
All vulnerabilities found on servers and desktops
Answers
B.
Only critical and high vulnerabilities on servers and desktops
B.
Only critical and high vulnerabilities on servers and desktops
Answers
C.
Only critical and high vulnerabilities that impact important production servers
C.
Only critical and high vulnerabilities that impact important production servers
Answers
D.
All vulnerabilities that impact important production servers
D.
All vulnerabilities that impact important production servers
Answers
Suggested answer: C

When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?

A.
Transfer financial resources from other critical programs
A.
Transfer financial resources from other critical programs
Answers
B.
Take the system off line until the budget is available
B.
Take the system off line until the budget is available
Answers
C.
Deploy countermeasures and compensating controls until the budget is available
C.
Deploy countermeasures and compensating controls until the budget is available
Answers
D.
Schedule an emergency meeting and request the funding to fix the issue
D.
Schedule an emergency meeting and request the funding to fix the issue
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46