ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?

A.
Vmware, router, switch, firewall, syslog, vulnerability management system (VMS)
A.
Vmware, router, switch, firewall, syslog, vulnerability management system (VMS)
Answers
B.
Intrusion Detection System (IDS), firewall, switch, syslog
B.
Intrusion Detection System (IDS), firewall, switch, syslog
Answers
C.
Security Incident Event Management (SIEM), IDS, router, syslog
C.
Security Incident Event Management (SIEM), IDS, router, syslog
Answers
D.
SIEM, IDS, firewall, VMS
D.
SIEM, IDS, firewall, VMS
Answers
Suggested answer: D

You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don't know what to do. What is the BEST approach to handle this situation?

A.
Tell the team to do their best and respond to each alert
A.
Tell the team to do their best and respond to each alert
Answers
B.
Tune the sensors to help reduce false positives so the team can react better
B.
Tune the sensors to help reduce false positives so the team can react better
Answers
C.
Request additional resources to handle the workload
C.
Request additional resources to handle the workload
Answers
D.
Tell the team to only respond to the critical and high alerts
D.
Tell the team to only respond to the critical and high alerts
Answers
Suggested answer: B

An example of professional unethical behavior is:

A.
Gaining access to an affiliated employee's work email account as part of an officially sanctioned internal investigation
A.
Gaining access to an affiliated employee's work email account as part of an officially sanctioned internal investigation
Answers
B.
Sharing copyrighted material with other members of a professional organization where all members have legitimate access to the material
B.
Sharing copyrighted material with other members of a professional organization where all members have legitimate access to the material
Answers
C.
Copying documents from an employer's server which you assert that you have an intellectual property claim to possess, but the company disputes
C.
Copying documents from an employer's server which you assert that you have an intellectual property claim to possess, but the company disputes
Answers
D.
Storing client lists and other sensitive corporate internal documents on a removable thumb drive
D.
Storing client lists and other sensitive corporate internal documents on a removable thumb drive
Answers
Suggested answer: C

A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:

A.
Vendor's client list of reputable organizations currently using their solution
A.
Vendor's client list of reputable organizations currently using their solution
Answers
B.
Vendor provided attestation of the detailed security controls from a reputable accounting firm
B.
Vendor provided attestation of the detailed security controls from a reputable accounting firm
Answers
C.
Vendor provided reference from an existing reputable client detailing their implementation
C.
Vendor provided reference from an existing reputable client detailing their implementation
Answers
D.
Vendor provided internal risk assessment and security control documentation
D.
Vendor provided internal risk assessment and security control documentation
Answers
Suggested answer: B

A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:

A.
Change management
A.
Change management
Answers
B.
Business continuity planning
B.
Business continuity planning
Answers
C.
Security Incident Response
C.
Security Incident Response
Answers
D.
Thought leadership
D.
Thought leadership
Answers
Suggested answer: C

A recommended method to document the respective roles of groups and individuals for a given process is to:

A.
Develop a detailed internal organization chart
A.
Develop a detailed internal organization chart
Answers
B.
Develop a telephone call tree for emergency response
B.
Develop a telephone call tree for emergency response
Answers
C.
Develop an isolinear response matrix with cost benefit analysis projections
C.
Develop an isolinear response matrix with cost benefit analysis projections
Answers
D.
Develop a Responsible, Accountable, Consulted, Informed (RACI) chart
D.
Develop a Responsible, Accountable, Consulted, Informed (RACI) chart
Answers
Suggested answer: D

Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?

A.
Upper management support
A.
Upper management support
Answers
B.
More frequent project milestone meetings
B.
More frequent project milestone meetings
Answers
C.
More training of staff members
C.
More training of staff members
Answers
D.
Involve internal audit
D.
Involve internal audit
Answers
Suggested answer: A

How often should the SSAE16 report of your vendors be reviewed?

A.
Quarterly
A.
Quarterly
Answers
B.
Semi-annually
B.
Semi-annually
Answers
C.
Annually
C.
Annually
Answers
D.
Bi-annually
D.
Bi-annually
Answers
Suggested answer: C

A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?

A.
Poor audit support for the security program
A.
Poor audit support for the security program
Answers
B.
A lack of executive presence within the security program
B.
A lack of executive presence within the security program
Answers
C.
Poor alignment of the security program to business needs
C.
Poor alignment of the security program to business needs
Answers
D.
This is normal since business units typically resist security requirements
D.
This is normal since business units typically resist security requirements
Answers
Suggested answer: C

Which of the following represents the best method of ensuring business unit alignment with security program requirements?

A.
Provide clear communication of security requirements throughout the organization
A.
Provide clear communication of security requirements throughout the organization
Answers
B.
Demonstrate executive support with written mandates for security policy adherence
B.
Demonstrate executive support with written mandates for security policy adherence
Answers
C.
Create collaborative risk management approaches within the organization
C.
Create collaborative risk management approaches within the organization
Answers
D.
Perform increased audits of security processes and procedures
D.
Perform increased audits of security processes and procedures
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46