ECCouncil 712-50 Practice Test - Questions Answers, Page 28

List of questions
Question 271

Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?
Question 272

Which of the following is MOST useful when developing a business case for security initiatives?
Question 273

The ability to demand the implementation and management of security controls on third parties providing services to an organization is
Question 274

Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
Question 275

The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called
Question 276

The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
Question 277

Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
Question 278

File Integrity Monitoring (FIM) is considered a
Question 279

A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Question 280

When dealing with risk, the information security practitioner may choose to:
Question