ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Related questions











Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?

A.
The Net Present Value (NPV) of the project is positive
A.
The Net Present Value (NPV) of the project is positive
Answers
B.
The NPV of the project is negative
B.
The NPV of the project is negative
Answers
C.
The Return on Investment (ROI) is larger than 10 months
C.
The Return on Investment (ROI) is larger than 10 months
Answers
D.
The ROI is lower than 10 months
D.
The ROI is lower than 10 months
Answers
Suggested answer: B

Which of the following is MOST useful when developing a business case for security initiatives?

A.
Budget forecasts
A.
Budget forecasts
Answers
B.
Request for proposals
B.
Request for proposals
Answers
C.
Cost/benefit analysis
C.
Cost/benefit analysis
Answers
D.
Vendor management
D.
Vendor management
Answers
Suggested answer: C

The ability to demand the implementation and management of security controls on third parties providing services to an organization is

A.
Security Governance
A.
Security Governance
Answers
B.
Compliance management
B.
Compliance management
Answers
C.
Vendor management
C.
Vendor management
Answers
D.
Disaster recovery
D.
Disaster recovery
Answers
Suggested answer: C

Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?

A.
Security regulations
A.
Security regulations
Answers
B.
Asset classification
B.
Asset classification
Answers
C.
Information security policy
C.
Information security policy
Answers
D.
Data classification
D.
Data classification
Answers
Suggested answer: C

The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called

A.
Security certification
A.
Security certification
Answers
B.
Security system analysis
B.
Security system analysis
Answers
C.
Security accreditation
C.
Security accreditation
Answers
D.
Alignment with business practices and goals.
D.
Alignment with business practices and goals.
Answers
Suggested answer: A

The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called

A.
Security certification
A.
Security certification
Answers
B.
Security system analysis
B.
Security system analysis
Answers
C.
Security accreditation
C.
Security accreditation
Answers
D.
Alignment with business practices and goals.
D.
Alignment with business practices and goals.
Answers
Suggested answer: C

Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of

A.
Network based security preventative controls
A.
Network based security preventative controls
Answers
B.
Software segmentation controls
B.
Software segmentation controls
Answers
C.
Network based security detective controls
C.
Network based security detective controls
Answers
D.
User segmentation controls
D.
User segmentation controls
Answers
Suggested answer: A

File Integrity Monitoring (FIM) is considered a

A.
Network based security preventative control
A.
Network based security preventative control
Answers
B.
Software segmentation control
B.
Software segmentation control
Answers
C.
Security detective control
C.
Security detective control
Answers
D.
User segmentation control
D.
User segmentation control
Answers
Suggested answer: C

A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered

A.
Zero-day attack mitigation
A.
Zero-day attack mitigation
Answers
B.
Preventive detection control
B.
Preventive detection control
Answers
C.
Corrective security control
C.
Corrective security control
Answers
D.
Dynamic blocking control
D.
Dynamic blocking control
Answers
Suggested answer: C

When dealing with risk, the information security practitioner may choose to:

A.
assign
A.
assign
Answers
B.
transfer
B.
transfer
Answers
C.
acknowledge
C.
acknowledge
Answers
D.
defer
D.
defer
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46