ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











Scenario: You are the CISO and have just completed your first risk assessment for your organization.

You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.

When formulating the remediation plan, what is a required input?

A.
Board of directors
A.
Board of directors
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Patching history
C.
Patching history
Answers
D.
Latest virus definitions file
D.
Latest virus definitions file
Answers
Suggested answer: B

Explanation:

Scenario6

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat a. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

What type of control is being implemented by supervisors and data owners?

A.
Management
A.
Management
Answers
B.
Operational
B.
Operational
Answers
C.
Technical
C.
Technical
Answers
D.
Administrative
D.
Administrative
Answers
Suggested answer: B

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat a. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

Once supervisors and data owners have approved requests, information system administrators will implement

A.
Technical control(s)
A.
Technical control(s)
Answers
B.
Management control(s)
B.
Management control(s)
Answers
C.
Policy control(s)
C.
Policy control(s)
Answers
D.
Operational control(s)
D.
Operational control(s)
Answers
Suggested answer: A

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat a. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?

A.
Turn off VPN access for users originating from outside the country
A.
Turn off VPN access for users originating from outside the country
Answers
B.
Enable monitoring on the VPN for suspicious activity
B.
Enable monitoring on the VPN for suspicious activity
Answers
C.
Force a change of all passwords
C.
Force a change of all passwords
Answers
D.
Block access to the Employee-Self Service application via VPN
D.
Block access to the Employee-Self Service application via VPN
Answers
Suggested answer: D

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat a. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

The organization wants a more permanent solution to the threat to user credential compromise through phishing. What technical solution would BEST address this issue?

A.
Professional user education on phishing conducted by a reputable vendor
A.
Professional user education on phishing conducted by a reputable vendor
Answers
B.
Multi-factor authentication employing hard tokens
B.
Multi-factor authentication employing hard tokens
Answers
C.
Forcing password changes every 90 days
C.
Forcing password changes every 90 days
Answers
D.
Decreasing the number of employees with administrator privileges
D.
Decreasing the number of employees with administrator privileges
Answers
Suggested answer: B

Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.

To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?

A.
Business Impact Analysis
A.
Business Impact Analysis
Answers
B.
Business Continuity plan
B.
Business Continuity plan
Answers
C.
Security roadmap
C.
Security roadmap
Answers
D.
Annual report to shareholders
D.
Annual report to shareholders
Answers
Suggested answer: A

Explanation:

Scenario7

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization's needs.

What is the MOST logical course of action the CISO should take?

A.
Review the original solution set to determine if another system would fit the organization's risk appetite and budget regulatory compliance requirements
A.
Review the original solution set to determine if another system would fit the organization's risk appetite and budget regulatory compliance requirements
Answers
B.
Continue with the implementation and submit change requests to the vendor in order to ensure required functionality will be provided when needed
B.
Continue with the implementation and submit change requests to the vendor in order to ensure required functionality will be provided when needed
Answers
C.
Continue with the project until the scalability issue is validated by others, such as an auditor or third party assessor
C.
Continue with the project until the scalability issue is validated by others, such as an auditor or third party assessor
Answers
D.
Cancel the project if the business need was based on internal requirements versus regulatory compliance requirements
D.
Cancel the project if the business need was based on internal requirements versus regulatory compliance requirements
Answers
Suggested answer: A

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization's needs.

The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system's scalability. This demonstrates which of the following?

A.
An approach that allows for minimum budget impact if the solution is unsuitable
A.
An approach that allows for minimum budget impact if the solution is unsuitable
Answers
B.
A methodology-based approach to ensure authentication mechanism functions
B.
A methodology-based approach to ensure authentication mechanism functions
Answers
C.
An approach providing minimum time impact to the implementation schedules
C.
An approach providing minimum time impact to the implementation schedules
Answers
D.
A risk-based approach to determine if the solution is suitable for investment
D.
A risk-based approach to determine if the solution is suitable for investment
Answers
Suggested answer: D

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization's needs.

The CISO discovers the scalability issue will only impact a small number of network segments. What is the next logical step to ensure the proper application of risk management methodology within the two-facto implementation project?

A.
Create new use cases for operational use of the solution
A.
Create new use cases for operational use of the solution
Answers
B.
Determine if sufficient mitigating controls can be applied
B.
Determine if sufficient mitigating controls can be applied
Answers
C.
Decide to accept the risk on behalf of the impacted business units
C.
Decide to accept the risk on behalf of the impacted business units
Answers
D.
Report the deficiency to the audit team and create process exceptions
D.
Report the deficiency to the audit team and create process exceptions
Answers
Suggested answer: B

Explanation:

Scenario8

Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the "real workers." What must you do first in order to shift the prevailing opinion and reshape corporate culture to understand the value of information security to the organization?

A.
Cite compliance with laws, statutes, and regulations – explaining the financial implications for the company for non-compliance
A.
Cite compliance with laws, statutes, and regulations – explaining the financial implications for the company for non-compliance
Answers
B.
Understand the business and focus your efforts on enabling operations securely
B.
Understand the business and focus your efforts on enabling operations securely
Answers
C.
Draw from your experience and recount stories of how other companies have been compromised
C.
Draw from your experience and recount stories of how other companies have been compromised
Answers
D.
Cite corporate policy and insist on compliance with audit findings
D.
Cite corporate policy and insist on compliance with audit findings
Answers
Suggested answer: B
Total 460 questions
Go to page: of 46