ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.

A.
Install software patch, Operate system, Maintain system
A.
Install software patch, Operate system, Maintain system
Answers
B.
Discover software, Remove affected software, Apply software patch
B.
Discover software, Remove affected software, Apply software patch
Answers
C.
Install software patch, configuration adjustment, Software Removal
C.
Install software patch, configuration adjustment, Software Removal
Answers
D.
Software removal, install software patch, maintain system
D.
Software removal, install software patch, maintain system
Answers
Suggested answer: C

When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?

A.
Threat Level, Risk of Compromise, and Consequences of Compromise
A.
Threat Level, Risk of Compromise, and Consequences of Compromise
Answers
B.
Risk Avoidance, Threat Level, and Consequences of Compromise
B.
Risk Avoidance, Threat Level, and Consequences of Compromise
Answers
C.
Risk Transfer, Reputational Impact, and Consequences of Compromise
C.
Risk Transfer, Reputational Impact, and Consequences of Compromise
Answers
D.
Reputational Impact, Financial Impact, and Risk of Compromise
D.
Reputational Impact, Financial Impact, and Risk of Compromise
Answers
Suggested answer: A

The effectiveness of an audit is measured by?

A.
The number of actionable items in the recommendations
A.
The number of actionable items in the recommendations
Answers
B.
How it exposes the risk tolerance of the company
B.
How it exposes the risk tolerance of the company
Answers
C.
How the recommendations directly support the goals of the company
C.
How the recommendations directly support the goals of the company
Answers
D.
The number of security controls the company has in use
D.
The number of security controls the company has in use
Answers
Suggested answer: C

A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?

A.
Have internal audit conduct another audit to see what has changed.
A.
Have internal audit conduct another audit to see what has changed.
Answers
B.
Contract with an external audit company to conduct an unbiased audit
B.
Contract with an external audit company to conduct an unbiased audit
Answers
C.
Review the recommendations and follow up to see if audit implemented the changes
C.
Review the recommendations and follow up to see if audit implemented the changes
Answers
D.
Meet with audit team to determine a timeline for corrections
D.
Meet with audit team to determine a timeline for corrections
Answers
Suggested answer: C

You have implemented the new controls. What is the next step?

A.
Document the process for the stakeholders
A.
Document the process for the stakeholders
Answers
B.
Monitor the effectiveness of the controls
B.
Monitor the effectiveness of the controls
Answers
C.
Update the audit findings report
C.
Update the audit findings report
Answers
D.
Perform a risk assessment
D.
Perform a risk assessment
Answers
Suggested answer: B

An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the

NEXT step?

A.
Determine the annual loss expectancy (ALE)
A.
Determine the annual loss expectancy (ALE)
Answers
B.
Create a crisis management plan
B.
Create a crisis management plan
Answers
C.
Create technology recovery plans
C.
Create technology recovery plans
Answers
D.
Build a secondary hot site
D.
Build a secondary hot site
Answers
Suggested answer: C

Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?

A.
Control Objective for Information Technology (COBIT)
A.
Control Objective for Information Technology (COBIT)
Answers
B.
Committee of Sponsoring Organizations (COSO)
B.
Committee of Sponsoring Organizations (COSO)
Answers
C.
Payment Card Industry (PCI)
C.
Payment Card Industry (PCI)
Answers
D.
Information Technology Infrastructure Library (ITIL)
D.
Information Technology Infrastructure Library (ITIL)
Answers
Suggested answer: A

Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?

A.
Plan-Check-Do-Act
A.
Plan-Check-Do-Act
Answers
B.
Plan-Do-Check-Act
B.
Plan-Do-Check-Act
Answers
C.
Plan-Select-Implement-Evaluate
C.
Plan-Select-Implement-Evaluate
Answers
D.
SCORE (Security Consensus Operational Readiness Evaluation)
D.
SCORE (Security Consensus Operational Readiness Evaluation)
Answers
Suggested answer: B

Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?

A.
To give information security management recommendations to those who are responsible for initiating, implementing, or maintaining security in their organization.
A.
To give information security management recommendations to those who are responsible for initiating, implementing, or maintaining security in their organization.
Answers
B.
To provide a common basis for developing organizational security standards
B.
To provide a common basis for developing organizational security standards
Answers
C.
To provide effective security management practice and to provide confidence in interorganizational dealings
C.
To provide effective security management practice and to provide confidence in interorganizational dealings
Answers
D.
To established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization
D.
To established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization
Answers
Suggested answer: D

Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?

A.
Senior Executives
A.
Senior Executives
Answers
B.
Office of the Auditor
B.
Office of the Auditor
Answers
C.
Office of the General Counsel
C.
Office of the General Counsel
Answers
D.
All employees and users
D.
All employees and users
Answers
Suggested answer: A
Total 460 questions
Go to page: of 46