ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











Which of the following is considered the MOST effective tool against social engineering?

A.
Anti-phishing tools
A.
Anti-phishing tools
Answers
B.
Anti-malware tools
B.
Anti-malware tools
Answers
C.
Effective Security Vulnerability Management Program
C.
Effective Security Vulnerability Management Program
Answers
D.
Effective Security awareness program
D.
Effective Security awareness program
Answers
Suggested answer: D

When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?

A.
Escalation
A.
Escalation
Answers
B.
Recovery
B.
Recovery
Answers
C.
Eradication
C.
Eradication
Answers
D.
Containment
D.
Containment
Answers
Suggested answer: D

Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?

A.
Poses a strong technical background
A.
Poses a strong technical background
Answers
B.
Understand all regulations affecting the organization
B.
Understand all regulations affecting the organization
Answers
C.
Understand the business goals of the organization
C.
Understand the business goals of the organization
Answers
D.
Poses a strong auditing background
D.
Poses a strong auditing background
Answers
Suggested answer: C

In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?

A.
High risk environments 6 months, low risk environments 12 months
A.
High risk environments 6 months, low risk environments 12 months
Answers
B.
Every 12 months
B.
Every 12 months
Answers
C.
Every 18 months
C.
Every 18 months
Answers
D.
Every six months
D.
Every six months
Answers
Suggested answer: B

Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization's products and services?

A.
Strong authentication technologies
A.
Strong authentication technologies
Answers
B.
Financial reporting regulations
B.
Financial reporting regulations
Answers
C.
Credit card compliance and regulations
C.
Credit card compliance and regulations
Answers
D.
Local privacy laws
D.
Local privacy laws
Answers
Suggested answer: D

You have implemented a new security control. Which of the following risk strategy options have you engaged in?

A.
Risk Avoidance
A.
Risk Avoidance
Answers
B.
Risk Acceptance
B.
Risk Acceptance
Answers
C.
Risk Transfer
C.
Risk Transfer
Answers
D.
Risk Mitigation
D.
Risk Mitigation
Answers
Suggested answer: D

You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?

A.
Risk Avoidance
A.
Risk Avoidance
Answers
B.
Risk Acceptance
B.
Risk Acceptance
Answers
C.
Risk Transfer
C.
Risk Transfer
Answers
D.
Risk Mitigation
D.
Risk Mitigation
Answers
Suggested answer: C

Risk that remains after risk mitigation is known as

A.
Persistent risk
A.
Persistent risk
Answers
B.
Residual risk
B.
Residual risk
Answers
C.
Accepted risk
C.
Accepted risk
Answers
D.
Non-tolerated risk
D.
Non-tolerated risk
Answers
Suggested answer: B

After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of

A.
Risk Tolerance
A.
Risk Tolerance
Answers
B.
Qualitative risk analysis
B.
Qualitative risk analysis
Answers
C.
Risk Appetite
C.
Risk Appetite
Answers
D.
Quantitative risk analysis
D.
Quantitative risk analysis
Answers
Suggested answer: D

When dealing with a risk management process, asset classification is important because it will impact the overall:

A.
Threat identification
A.
Threat identification
Answers
B.
Risk monitoring
B.
Risk monitoring
Answers
C.
Risk treatment
C.
Risk treatment
Answers
D.
Risk tolerance
D.
Risk tolerance
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46