ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 19

Question list
Search
Search

Related questions











Which business stakeholder is accountable for the integrity of a new information system?

A.
CISO
A.
CISO
Answers
B.
Compliance Officer
B.
Compliance Officer
Answers
C.
Project manager
C.
Project manager
Answers
D.
Board of directors
D.
Board of directors
Answers
Suggested answer: A

As the CISO for your company you are accountable for the protection of information resources commensurate with:

A.
Customer demand
A.
Customer demand
Answers
B.
Cost and time to replace
B.
Cost and time to replace
Answers
C.
Insurability tables
C.
Insurability tables
Answers
D.
Risk of exposure
D.
Risk of exposure
Answers
Suggested answer: D

A stakeholder is a person or group:

A.
Vested in the success and/or failure of a project or initiative regardless of budget implications.
A.
Vested in the success and/or failure of a project or initiative regardless of budget implications.
Answers
B.
Vested in the success and/or failure of a project or initiative and is tied to the project budget.
B.
Vested in the success and/or failure of a project or initiative and is tied to the project budget.
Answers
C.
That has budget authority.
C.
That has budget authority.
Answers
D.
That will ultimately use the system.
D.
That will ultimately use the system.
Answers
Suggested answer: A

Your company has a "no right to privacy" notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee's email account. What should you do? (choose the BEST answer):

A.
Grant her access, the employee has been adequately warned through the AUP.
A.
Grant her access, the employee has been adequately warned through the AUP.
Answers
B.
Assist her with the request, but only after her supervisor signs off on the action.
B.
Assist her with the request, but only after her supervisor signs off on the action.
Answers
C.
Reset the employee's password and give it to the supervisor.
C.
Reset the employee's password and give it to the supervisor.
Answers
D.
Deny the request citing national privacy laws.
D.
Deny the request citing national privacy laws.
Answers
Suggested answer: B

Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):

A.
low risk-tolerance
A.
low risk-tolerance
Answers
B.
high risk-tolerance
B.
high risk-tolerance
Answers
C.
moderate risk-tolerance
C.
moderate risk-tolerance
Answers
D.
medium-high risk-tolerance
D.
medium-high risk-tolerance
Answers
Suggested answer: A

The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted.

Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):

A.
Failed to identify all stakeholders and their needs
A.
Failed to identify all stakeholders and their needs
Answers
B.
Deployed the encryption solution in an inadequate manner
B.
Deployed the encryption solution in an inadequate manner
Answers
C.
Used 1024 bit encryption when 256 bit would have sufficed
C.
Used 1024 bit encryption when 256 bit would have sufficed
Answers
D.
Used hardware encryption instead of software encryption
D.
Used hardware encryption instead of software encryption
Answers
Suggested answer: A

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

A.
Type of data contained in the process/system
A.
Type of data contained in the process/system
Answers
B.
Type of connection/protocol used to transfer the data
B.
Type of connection/protocol used to transfer the data
Answers
C.
Type of encryption required for the data once it is at rest
C.
Type of encryption required for the data once it is at rest
Answers
D.
Type of computer the data is processed on
D.
Type of computer the data is processed on
Answers
Suggested answer: A

When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)

A.
The CISO should cut other essential programs to ensure the new solution's continued use
A.
The CISO should cut other essential programs to ensure the new solution's continued use
Answers
B.
Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution's continued use
B.
Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution's continued use
Answers
C.
Defer selection until the market improves and cash flow is positive
C.
Defer selection until the market improves and cash flow is positive
Answers
D.
Implement the solution and ask for the increased operating cost budget when it is time
D.
Implement the solution and ask for the increased operating cost budget when it is time
Answers
Suggested answer: B

Which of the following information may be found in table top exercises for incident response?

A.
Security budget augmentation
A.
Security budget augmentation
Answers
B.
Process improvements
B.
Process improvements
Answers
C.
Real-time to remediate
C.
Real-time to remediate
Answers
D.
Security control selection
D.
Security control selection
Answers
Suggested answer: B

Your incident response plan should include which of the following?

A.
Procedures for litigation
A.
Procedures for litigation
Answers
B.
Procedures for reclamation
B.
Procedures for reclamation
Answers
C.
Procedures for classification
C.
Procedures for classification
Answers
D.
Procedures for charge-back
D.
Procedures for charge-back
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46