ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?

A.
Management Control
A.
Management Control
Answers
B.
Technical Control
B.
Technical Control
Answers
C.
Training Control
C.
Training Control
Answers
D.
Operational Control
D.
Operational Control
Answers
Suggested answer: D

Which of the following illustrates an operational control process:

A.
Classifying an information system as part of a risk assessment
A.
Classifying an information system as part of a risk assessment
Answers
B.
Installing an appropriate fire suppression system in the data center
B.
Installing an appropriate fire suppression system in the data center
Answers
C.
Conducting an audit of the configuration management process
C.
Conducting an audit of the configuration management process
Answers
D.
Establishing procurement standards for cloud vendors
D.
Establishing procurement standards for cloud vendors
Answers
Suggested answer: B

With respect to the audit management process, management response serves what function?

A.
placing underperforming units on notice for failing to meet standards
A.
placing underperforming units on notice for failing to meet standards
Answers
B.
determining whether or not resources will be allocated to remediate a finding
B.
determining whether or not resources will be allocated to remediate a finding
Answers
C.
adding controls to ensure that proper oversight is achieved by management
C.
adding controls to ensure that proper oversight is achieved by management
Answers
D.
revealing the "root cause" of the process failure and mitigating for all internal and external units
D.
revealing the "root cause" of the process failure and mitigating for all internal and external units
Answers
Suggested answer: B

Which of the following are primary concerns for management with regard to assessing internal control objectives?

A.
Confidentiality, Availability, Integrity
A.
Confidentiality, Availability, Integrity
Answers
B.
Compliance, Effectiveness, Efficiency
B.
Compliance, Effectiveness, Efficiency
Answers
C.
Communication, Reliability, Cost
C.
Communication, Reliability, Cost
Answers
D.
Confidentiality, Compliance, Cost
D.
Confidentiality, Compliance, Cost
Answers
Suggested answer: B

Which of the following are necessary to formulate responses to external audit findings?

A.
Internal Audit, Management, and Technical Staff
A.
Internal Audit, Management, and Technical Staff
Answers
B.
Internal Audit, Budget Authority, Management
B.
Internal Audit, Budget Authority, Management
Answers
C.
Technical Staff, Budget Authority, Management
C.
Technical Staff, Budget Authority, Management
Answers
D.
Technical Staff, Internal Audit, Budget Authority
D.
Technical Staff, Internal Audit, Budget Authority
Answers
Suggested answer: C

The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?

A.
Number of callers who report security issues.
A.
Number of callers who report security issues.
Answers
B.
Number of callers who report a lack of customer service from the call center
B.
Number of callers who report a lack of customer service from the call center
Answers
C.
Number of successful social engineering attempts on the call center
C.
Number of successful social engineering attempts on the call center
Answers
D.
Number of callers who abandon the call before speaking with a representative
D.
Number of callers who abandon the call before speaking with a representative
Answers
Suggested answer: C

Creating a secondary authentication process for network access would be an example of?

A.
Nonlinearities in physical security performance metrics
A.
Nonlinearities in physical security performance metrics
Answers
B.
Defense in depth cost enumerated costs
B.
Defense in depth cost enumerated costs
Answers
C.
System hardening and patching requirements
C.
System hardening and patching requirements
Answers
D.
Anti-virus for mobile devices
D.
Anti-virus for mobile devices
Answers
Suggested answer: A

Which of the following activities is the MAIN purpose of the risk assessment process?

A.
Creating an inventory of information assets
A.
Creating an inventory of information assets
Answers
B.
Classifying and organizing information assets into meaningful groups
B.
Classifying and organizing information assets into meaningful groups
Answers
C.
Assigning value to each information asset
C.
Assigning value to each information asset
Answers
D.
Calculating the risks to which assets are exposed in their current setting
D.
Calculating the risks to which assets are exposed in their current setting
Answers
Suggested answer: D

Which of the following activities must be completed BEFORE you can calculate risk?

A.
Determining the likelihood that vulnerable systems will be attacked by specific threats
A.
Determining the likelihood that vulnerable systems will be attacked by specific threats
Answers
B.
Calculating the risks to which assets are exposed in their current setting
B.
Calculating the risks to which assets are exposed in their current setting
Answers
C.
Assigning a value to each information asset
C.
Assigning a value to each information asset
Answers
D.
Assessing the relative risk facing the organization's information assets
D.
Assessing the relative risk facing the organization's information assets
Answers
Suggested answer: C

Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?

A.
Incident response plan
A.
Incident response plan
Answers
B.
Business Continuity plan
B.
Business Continuity plan
Answers
C.
Disaster recovery plan
C.
Disaster recovery plan
Answers
D.
Damage control plan
D.
Damage control plan
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46