ECCouncil 712-50 Practice Test - Questions Answers, Page 18

List of questions
Question 171

Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?
Question 172

You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
Question 173

A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
Question 174

An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a
MAJOR constraint for the project?
Question 175

A system was hardened at the Operating System level and placed into the production environment.
Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?
Question 176

Which of the following are not stakeholders of IT security projects?
Question 177

The ultimate goal of an IT security projects is:
Question 178

When managing the critical path of an IT security project, which of the following is MOST important?
Question 179

When is an application security development project complete?
Question 180

When should IT security project management be outsourced?
Question