ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 28

Add to Whishlist

List of questions

Question 271

Report Export Collapse

Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 272

Report Export Collapse

Which of the following is MOST useful when developing a business case for security initiatives?

Become a Premium Member for full access
  Unlock Premium Member

Question 273

Report Export Collapse

The ability to demand the implementation and management of security controls on third parties providing services to an organization is

Become a Premium Member for full access
  Unlock Premium Member

Question 274

Report Export Collapse

Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?

Become a Premium Member for full access
  Unlock Premium Member

Question 275

Report Export Collapse

The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called

Become a Premium Member for full access
  Unlock Premium Member

Question 276

Report Export Collapse

The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called

Become a Premium Member for full access
  Unlock Premium Member

Question 277

Report Export Collapse

Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of

Become a Premium Member for full access
  Unlock Premium Member

Question 278

Report Export Collapse

File Integrity Monitoring (FIM) is considered a

Become a Premium Member for full access
  Unlock Premium Member

Question 279

Report Export Collapse

A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered

Become a Premium Member for full access
  Unlock Premium Member

Question 280

Report Export Collapse

When dealing with risk, the information security practitioner may choose to:

Become a Premium Member for full access
  Unlock Premium Member
Total 460 questions
Go to page: of 46

Related questions