ECCouncil 712-50 Practice Test - Questions Answers, Page 28
List of questions
Question 271
Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?
Question 272
Which of the following is MOST useful when developing a business case for security initiatives?
Question 273
The ability to demand the implementation and management of security controls on third parties providing services to an organization is
Question 274
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
Question 275
The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called
Question 276
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
Question 277
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
Question 278
File Integrity Monitoring (FIM) is considered a
Question 279
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Question 280
When dealing with risk, the information security practitioner may choose to:
Question