ECCouncil 712-50 Practice Test - Questions Answers, Page 15
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 141
 
                            
                            
                                An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
Question 142
 
                            
                            
                                When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
Question 143
 
                            
                            
                                The effectiveness of an audit is measured by?
Question 144
 
                            
                            
                                A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
Question 145
 
                            
                            
                                You have implemented the new controls. What is the next step?
Question 146
 
                            
                            
                                An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the
NEXT step?
Question 147
 
                            
                            
                                Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
Question 148
 
                            
                            
                                Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Question 149
 
                            
                            
                                Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Question 150
 
                            
                            
                                Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question