ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











Which of the following should be determined while defining risk management strategies?

A.
Organizational objectives and risk tolerance
A.
Organizational objectives and risk tolerance
Answers
B.
Risk assessment criteria
B.
Risk assessment criteria
Answers
C.
IT architecture complexity
C.
IT architecture complexity
Answers
D.
Enterprise disaster recovery plans
D.
Enterprise disaster recovery plans
Answers
Suggested answer: A

Who in the organization determines access to information?

A.
Legal department
A.
Legal department
Answers
B.
Compliance officer
B.
Compliance officer
Answers
C.
Data Owner
C.
Data Owner
Answers
D.
Information security officer
D.
Information security officer
Answers
Suggested answer: C

Which of the following is a benefit of information security governance?

A.
Questioning the trust in vendor relationships.
A.
Questioning the trust in vendor relationships.
Answers
B.
Increasing the risk of decisions based on incomplete management information.
B.
Increasing the risk of decisions based on incomplete management information.
Answers
C.
Direct involvement of senior management in developing control processes
C.
Direct involvement of senior management in developing control processes
Answers
D.
Reduction of the potential for civil and legal liability
D.
Reduction of the potential for civil and legal liability
Answers
Suggested answer: D

Which of the following is the MOST important benefit of an effective security governance process?

A.
Reduction of liability and overall risk to the organization
A.
Reduction of liability and overall risk to the organization
Answers
B.
Better vendor management
B.
Better vendor management
Answers
C.
Reduction of security breaches
C.
Reduction of security breaches
Answers
D.
Senior management participation in the incident response process
D.
Senior management participation in the incident response process
Answers
Suggested answer: A

The FIRST step in establishing a security governance program is to?

A.
Conduct a risk assessment.
A.
Conduct a risk assessment.
Answers
B.
Obtain senior level sponsorship.
B.
Obtain senior level sponsorship.
Answers
C.
Conduct a workshop for all end users.
C.
Conduct a workshop for all end users.
Answers
D.
Prepare a security budget.
D.
Prepare a security budget.
Answers
Suggested answer: B

Which of the following has the GREATEST impact on the implementation of an information security governance model?

A.
Organizational budget
A.
Organizational budget
Answers
B.
Distance between physical locations
B.
Distance between physical locations
Answers
C.
Number of employees
C.
Number of employees
Answers
D.
Complexity of organizational structure
D.
Complexity of organizational structure
Answers
Suggested answer: D

From an information security perspective, information that no longer supports the main purpose of the business should be:

A.
assessed by a business impact analysis.
A.
assessed by a business impact analysis.
Answers
B.
protected under the information classification policy.
B.
protected under the information classification policy.
Answers
C.
analyzed under the data ownership policy.
C.
analyzed under the data ownership policy.
Answers
D.
analyzed under the retention policy
D.
analyzed under the retention policy
Answers
Suggested answer: D

The alerting, monitoring and life-cycle management of security related events is typically handled by the

A.
security threat and vulnerability management process
A.
security threat and vulnerability management process
Answers
B.
risk assessment process
B.
risk assessment process
Answers
C.
risk management process
C.
risk management process
Answers
D.
governance, risk, and compliance tools
D.
governance, risk, and compliance tools
Answers
Suggested answer: A

One of the MAIN goals of a Business Continuity Plan is to

A.
Ensure all infrastructure and applications are available in the event of a disaster
A.
Ensure all infrastructure and applications are available in the event of a disaster
Answers
B.
Allow all technical first-responders to understand their roles in the event of a disaster
B.
Allow all technical first-responders to understand their roles in the event of a disaster
Answers
C.
Provide step by step plans to recover business processes in the event of a disaster
C.
Provide step by step plans to recover business processes in the event of a disaster
Answers
D.
Assign responsibilities to the technical teams responsible for the recovery of all data.
D.
Assign responsibilities to the technical teams responsible for the recovery of all data.
Answers
Suggested answer: C

When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?

A.
An independent Governance, Risk and Compliance organization
A.
An independent Governance, Risk and Compliance organization
Answers
B.
Alignment of security goals with business goals
B.
Alignment of security goals with business goals
Answers
C.
Compliance with local privacy regulations
C.
Compliance with local privacy regulations
Answers
D.
Support from Legal and HR teams
D.
Support from Legal and HR teams
Answers
Suggested answer: B
Total 460 questions
Go to page: of 46