ECCouncil 712-50 Practice Test - Questions Answers, Page 18
List of questions
Related questions
Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?
You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a
MAJOR constraint for the project?
A system was hardened at the Operating System level and placed into the production environment.
Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?
Which of the following are not stakeholders of IT security projects?
The ultimate goal of an IT security projects is:
When managing the critical path of an IT security project, which of the following is MOST important?
When is an application security development project complete?
When should IT security project management be outsourced?
Question