ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?

A.
Effective use of existing technologies
A.
Effective use of existing technologies
Answers
B.
Create a comprehensive security awareness program and provide success metrics to business units
B.
Create a comprehensive security awareness program and provide success metrics to business units
Answers
C.
Proper budget management
C.
Proper budget management
Answers
D.
Leveraging existing implementations
D.
Leveraging existing implementations
Answers
Suggested answer: B

Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.

From an Information Security Leadership perspective, which of the following is a MAJOR concern about the CISO's approach to security?

A.
Compliance centric agenda
A.
Compliance centric agenda
Answers
B.
IT security centric agenda
B.
IT security centric agenda
Answers
C.
Lack of risk management process
C.
Lack of risk management process
Answers
D.
Lack of sponsorship from executive management
D.
Lack of sponsorship from executive management
Answers
Suggested answer: B

A CISO has implemented a risk management capability within the security portfolio. Which of the following terms best describes this functionality?

A.
Service
A.
Service
Answers
B.
Program
B.
Program
Answers
C.
Portfolio
C.
Portfolio
Answers
D.
Cost center
D.
Cost center
Answers
Suggested answer: B

Using the Transport Layer Security (TLS) protocol enables a client in a network to be:

A.
Provided with a digital signature
A.
Provided with a digital signature
Answers
B.
Assured of the server's identity
B.
Assured of the server's identity
Answers
C.
Identified by a network
C.
Identified by a network
Answers
D.
Registered by the server
D.
Registered by the server
Answers
Suggested answer: B

Explanation:

Reference: https://ukdiss.com/examples/tls.php

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?

A.
Video surveillance
A.
Video surveillance
Answers
B.
Mantrap
B.
Mantrap
Answers
C.
Bollards
C.
Bollards
Answers
D.
Fence
D.
Fence
Answers
Suggested answer: D

Which of the following is the MOST logical method of deploying security controls within an organization?

A.
Obtain funding for all desired controls and then create project plans for implementation
A.
Obtain funding for all desired controls and then create project plans for implementation
Answers
B.
Apply the simpler controls as quickly as possible and use a risk-based approach for the more difficult and costly controls
B.
Apply the simpler controls as quickly as possible and use a risk-based approach for the more difficult and costly controls
Answers
C.
Apply the least costly controls to demonstrate positive program activity
C.
Apply the least costly controls to demonstrate positive program activity
Answers
D.
Obtain business unit buy-in through close communication and coordination
D.
Obtain business unit buy-in through close communication and coordination
Answers
Suggested answer: B

Which of the following is a primary method of applying consistent configurations to IT systems?

A.
Audits
A.
Audits
Answers
B.
Administration
B.
Administration
Answers
C.
Patching
C.
Patching
Answers
D.
Templates
D.
Templates
Answers
Suggested answer: C

Where does bottom-up financial planning primarily gain information for creating budgets?

A.
By adding all capital and operational costs from the prior budgetary cycle, and determining potential financial shortages
A.
By adding all capital and operational costs from the prior budgetary cycle, and determining potential financial shortages
Answers
B.
By reviewing last year's program-level costs and adding a percentage of expected additional portfolio costs
B.
By reviewing last year's program-level costs and adding a percentage of expected additional portfolio costs
Answers
C.
By adding the cost of all known individual tasks and projects that are planned for the next budgetary cycle
C.
By adding the cost of all known individual tasks and projects that are planned for the next budgetary cycle
Answers
D.
By adding all planned operational expenses per quarter then summarizing them in a budget request
D.
By adding all planned operational expenses per quarter then summarizing them in a budget request
Answers
Suggested answer: D

Which of the following best describes revenue?

A.
Non-operating financial liabilities minus expenses
A.
Non-operating financial liabilities minus expenses
Answers
B.
The true profit-making potential of an organization
B.
The true profit-making potential of an organization
Answers
C.
The sum value of all assets and cash flow into the business
C.
The sum value of all assets and cash flow into the business
Answers
D.
The economic benefit derived by operating a business
D.
The economic benefit derived by operating a business
Answers
Suggested answer: D

Explanation:

Reference: https://www.investopedia.com/terms/r/revenue.asp

Which of the following is the MOST effective method for discovering common technical vulnerabilities within the IT environment?

A.
Reviewing system administrator logs
A.
Reviewing system administrator logs
Answers
B.
Auditing configuration templates
B.
Auditing configuration templates
Answers
C.
Checking vendor product releases
C.
Checking vendor product releases
Answers
D.
Performing system scans
D.
Performing system scans
Answers
Suggested answer: D
Total 460 questions
Go to page: of 46