ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?

A.
Risk averse
A.
Risk averse
Answers
B.
Risk tolerant
B.
Risk tolerant
Answers
C.
Risk conditional
C.
Risk conditional
Answers
D.
Risk minimal
D.
Risk minimal
Answers
Suggested answer: B

Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?

A.
Cost benefit
A.
Cost benefit
Answers
B.
Risk appetite
B.
Risk appetite
Answers
C.
Business continuity
C.
Business continuity
Answers
D.
Likelihood of impact
D.
Likelihood of impact
Answers
Suggested answer: B

Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?

A.
Define the risk appetite
A.
Define the risk appetite
Answers
B.
Determine budget constraints
B.
Determine budget constraints
Answers
C.
Review project charters
C.
Review project charters
Answers
D.
Collaborate security projects
D.
Collaborate security projects
Answers
Suggested answer: A

Which of the following is a major benefit of applying risk levels?

A.
Risk management governance becomes easier since most risks remain low once mitigated
A.
Risk management governance becomes easier since most risks remain low once mitigated
Answers
B.
Resources are not wasted on risks that are already managed to an acceptable level
B.
Resources are not wasted on risks that are already managed to an acceptable level
Answers
C.
Risk budgets are more easily managed due to fewer identified risks as a result of using a methodology
C.
Risk budgets are more easily managed due to fewer identified risks as a result of using a methodology
Answers
D.
Risk appetite can increase within the organization once the levels are understood
D.
Risk appetite can increase within the organization once the levels are understood
Answers
Suggested answer: B

Which of the following best summarizes the primary goal of a security program?

A.
Provide security reporting to all levels of an organization
A.
Provide security reporting to all levels of an organization
Answers
B.
Create effective security awareness to employees
B.
Create effective security awareness to employees
Answers
C.
Manage risk within the organization
C.
Manage risk within the organization
Answers
D.
Assure regulatory compliance
D.
Assure regulatory compliance
Answers
Suggested answer: C

Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?

A.
Risk Management
A.
Risk Management
Answers
B.
Risk Assessment
B.
Risk Assessment
Answers
C.
System Testing
C.
System Testing
Answers
D.
Vulnerability Assessment
D.
Vulnerability Assessment
Answers
Suggested answer: B

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

A.
Risk Assessment
A.
Risk Assessment
Answers
B.
Incident Response
B.
Incident Response
Answers
C.
Risk Management
C.
Risk Management
Answers
D.
Network Security administration
D.
Network Security administration
Answers
Suggested answer: C

Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?

A.
System testing
A.
System testing
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Incident response
C.
Incident response
Answers
D.
Planning
D.
Planning
Answers
Suggested answer: A

Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?

A.
Security administrators
A.
Security administrators
Answers
B.
Security mangers
B.
Security mangers
Answers
C.
Security technicians
C.
Security technicians
Answers
D.
Security analysts
D.
Security analysts
Answers
Suggested answer: B

In effort to save your company money which of the following methods of training results in the lowest cost for the organization?

A.
Distance learning/Web seminars
A.
Distance learning/Web seminars
Answers
B.
Formal Class
B.
Formal Class
Answers
C.
One-One Training
C.
One-One Training
Answers
D.
Self –Study (noncomputerized)
D.
Self –Study (noncomputerized)
Answers
Suggested answer: D

Explanation:

Topic 4, Information Security Core Competencies

Total 460 questions
Go to page: of 46