ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which of the following is considered the MOST effective tool against social engineering?

Anti-phishing tools
Anti-phishing tools
Anti-malware tools
Anti-malware tools
Effective Security Vulnerability Management Program
Effective Security Vulnerability Management Program
Effective Security awareness program
Effective Security awareness program
Suggested answer: D
asked 18/09/2024
Sergiu Anton
39 questions

Question 22

Report Export Collapse

When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?

Escalation
Escalation
Recovery
Recovery
Eradication
Eradication
Containment
Containment
Suggested answer: D
asked 18/09/2024
Neha Kumari
59 questions

Question 23

Report Export Collapse

Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?

Poses a strong technical background
Poses a strong technical background
Understand all regulations affecting the organization
Understand all regulations affecting the organization
Understand the business goals of the organization
Understand the business goals of the organization
Poses a strong auditing background
Poses a strong auditing background
Suggested answer: C
asked 18/09/2024
Md Hossain
48 questions

Question 24

Report Export Collapse

In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?

High risk environments 6 months, low risk environments 12 months
High risk environments 6 months, low risk environments 12 months
Every 12 months
Every 12 months
Every 18 months
Every 18 months
Every six months
Every six months
Suggested answer: B
asked 18/09/2024
Jack de Cort
44 questions

Question 25

Report Export Collapse

Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization's products and services?

Strong authentication technologies
Strong authentication technologies
Financial reporting regulations
Financial reporting regulations
Credit card compliance and regulations
Credit card compliance and regulations
Local privacy laws
Local privacy laws
Suggested answer: D
asked 18/09/2024
mohammed rafiuddin
41 questions

Question 26

Report Export Collapse

You have implemented a new security control. Which of the following risk strategy options have you engaged in?

Risk Avoidance
Risk Avoidance
Risk Acceptance
Risk Acceptance
Risk Transfer
Risk Transfer
Risk Mitigation
Risk Mitigation
Suggested answer: D
asked 18/09/2024
David Powell
35 questions

Question 27

Report Export Collapse

You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?

Risk Avoidance
Risk Avoidance
Risk Acceptance
Risk Acceptance
Risk Transfer
Risk Transfer
Risk Mitigation
Risk Mitigation
Suggested answer: C
asked 18/09/2024
PRIYANK SAXENA
54 questions

Question 28

Report Export Collapse

Risk that remains after risk mitigation is known as

Persistent risk
Persistent risk
Residual risk
Residual risk
Accepted risk
Accepted risk
Non-tolerated risk
Non-tolerated risk
Suggested answer: B
asked 18/09/2024
ROBERTO INFANTAS
40 questions

Question 29

Report Export Collapse

After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of

Risk Tolerance
Risk Tolerance
Qualitative risk analysis
Qualitative risk analysis
Risk Appetite
Risk Appetite
Quantitative risk analysis
Quantitative risk analysis
Suggested answer: D
asked 18/09/2024
Tuan Nguyen
49 questions

Question 30

Report Export Collapse

When dealing with a risk management process, asset classification is important because it will impact the overall:

Threat identification
Threat identification
Risk monitoring
Risk monitoring
Risk treatment
Risk treatment
Risk tolerance
Risk tolerance
Suggested answer: C
asked 18/09/2024
Sujit Singh
37 questions
Total 460 questions
Go to page: of 46

Related questions