ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 38

Question list
Search
Search

Related questions











A large number of accounts in a hardened system were suddenly compromised to an external party.

Which of the following is the MOST probable threat actor involved in this incident?

A.
Poorly configured firewalls
A.
Poorly configured firewalls
Answers
B.
Malware
B.
Malware
Answers
C.
Advanced Persistent Threat (APT)
C.
Advanced Persistent Threat (APT)
Answers
D.
An insider
D.
An insider
Answers
Suggested answer: D

Which of the following defines the boundaries and scope of a risk assessment?

A.
The risk assessment schedule
A.
The risk assessment schedule
Answers
B.
The risk assessment framework
B.
The risk assessment framework
Answers
C.
The risk assessment charter
C.
The risk assessment charter
Answers
D.
The assessment context
D.
The assessment context
Answers
Suggested answer: B

Explanation:

Reference: https://cfocussoftware.com/risk-management-framework/know-your-boundary/

Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?

A.
They need to use Nessus.
A.
They need to use Nessus.
Answers
B.
They can implement Wireshark.
B.
They can implement Wireshark.
Answers
C.
Snort is the best tool for their situation.
C.
Snort is the best tool for their situation.
Answers
D.
They could use Tripwire.
D.
They could use Tripwire.
Answers
Suggested answer: C

Explanation:

Reference: https://searchnetworking.techtarget.com/definition/Snort

Which of the following is true regarding expenditures?

A.
Capital expenditures are never taxable
A.
Capital expenditures are never taxable
Answers
B.
Operating expenditures are for acquiring assets, capital expenditures are for support costs of that asset
B.
Operating expenditures are for acquiring assets, capital expenditures are for support costs of that asset
Answers
C.
Capital expenditures are used to define depreciation tables of intangible assets
C.
Capital expenditures are used to define depreciation tables of intangible assets
Answers
D.
Capital expenditures are for acquiring assets, whereas operating expenditures are for support costs of that asset
D.
Capital expenditures are for acquiring assets, whereas operating expenditures are for support costs of that asset
Answers
Suggested answer: D

At what level of governance are individual projects monitored and managed?

A.
Program
A.
Program
Answers
B.
Milestone
B.
Milestone
Answers
C.
Enterprise
C.
Enterprise
Answers
D.
Portfolio
D.
Portfolio
Answers
Suggested answer: D

A digital signature addresses which of the following concerns?

A.
Message alteration
A.
Message alteration
Answers
B.
Message copying
B.
Message copying
Answers
C.
Message theft
C.
Message theft
Answers
D.
Unauthorized reading
D.
Unauthorized reading
Answers
Suggested answer: A

Explanation:

Reference: https://www.entrust.com/resources/certificate-solutions/learn/digital-signatures

What are the three stages of an identity and access management system?

A.
Authentication, Authorize, Validation
A.
Authentication, Authorize, Validation
Answers
B.
Provision, Administration, Enforcement
B.
Provision, Administration, Enforcement
Answers
C.
Administration, Validation, Protect
C.
Administration, Validation, Protect
Answers
D.
Provision, Administration, Authentication
D.
Provision, Administration, Authentication
Answers
Suggested answer: A

Explanation:

Reference: https://digitalguardian.com/blog/what-identity-and-access-management-iam

During the last decade, what trend has caused the MOST serious issues in relation to physical security?

A.
Data is more portable due to the increased use of smartphones and tablets
A.
Data is more portable due to the increased use of smartphones and tablets
Answers
B.
The move from centralized computing to decentralized computing
B.
The move from centralized computing to decentralized computing
Answers
C.
Camera systems have become more economical and expanded in their use
C.
Camera systems have become more economical and expanded in their use
Answers
D.
The internet of Things allows easy compromise of cloud-based systems
D.
The internet of Things allows easy compromise of cloud-based systems
Answers
Suggested answer: A

Which of the following is the MOST important reason for performing assessments of the security portfolio?

A.
To assure that the portfolio is aligned to the needs of the broader organization
A.
To assure that the portfolio is aligned to the needs of the broader organization
Answers
B.
To create executive support of the portfolio
B.
To create executive support of the portfolio
Answers
C.
To discover new technologies and processes for implementation within the portfolio
C.
To discover new technologies and processes for implementation within the portfolio
Answers
D.
To provide independent 3rd party reviews of security effectiveness
D.
To provide independent 3rd party reviews of security effectiveness
Answers
Suggested answer: A

Which of the following terms is used to describe countermeasures implemented to minimize risks to physical property, information, and computing systems?

A.
Security frameworks
A.
Security frameworks
Answers
B.
Security policies
B.
Security policies
Answers
C.
Security awareness
C.
Security awareness
Answers
D.
Security controls
D.
Security controls
Answers
Suggested answer: D

Explanation:

Reference: https://www.ibm.com/cloud/learn/security-controls

Total 460 questions
Go to page: of 46