ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a

MAJOR constraint for the project?

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

A system was hardened at the Operating System level and placed into the production environment.

Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

Which of the following are not stakeholders of IT security projects?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

The ultimate goal of an IT security projects is:

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

When managing the critical path of an IT security project, which of the following is MOST important?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

When is an application security development project complete?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

When should IT security project management be outsourced?

Become a Premium Member for full access
  Unlock Premium Member
Total 460 questions
Go to page: of 46

Related questions