ECCouncil 712-50 Practice Test - Questions Answers, Page 15

List of questions
Question 141

An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
Question 142

When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
Question 143

The effectiveness of an audit is measured by?
Question 144

A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
Question 145

You have implemented the new controls. What is the next step?
Question 146

An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the
NEXT step?
Question 147

Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
Question 148

Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Question 149

Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Question 150

Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
Question