ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











Which of the following best describes an access control process that confirms the identity of the entity seeking access to a logical or physical area?

A.
Identification
A.
Identification
Answers
B.
Authorization
B.
Authorization
Answers
C.
Authentication
C.
Authentication
Answers
D.
Accountability
D.
Accountability
Answers
Suggested answer: B

As the Chief Information Security Officer, you are performing an assessment of security posture to understand what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows to detect and actively stop vulnerability exploits and attacks?

A.
Gigamon
A.
Gigamon
Answers
B.
Intrusion Prevention System
B.
Intrusion Prevention System
Answers
C.
Port Security
C.
Port Security
Answers
D.
Anti-virus
D.
Anti-virus
Answers
Suggested answer: B

Explanation:

Reference: https://searchsecurity.techtarget.com/definition/intrusion-prevention

Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the following best describes the problem he has encountered?

A.
Rights collision
A.
Rights collision
Answers
B.
Excessive privileges
B.
Excessive privileges
Answers
C.
Privilege creep
C.
Privilege creep
Answers
D.
Least privileges
D.
Least privileges
Answers
Suggested answer: B

Which of the following best describes the sensors designed to project and detect a light beam across an area?

A.
Smoke
A.
Smoke
Answers
B.
Thermal
B.
Thermal
Answers
C.
Air-aspirating
C.
Air-aspirating
Answers
D.
Photo electric
D.
Photo electric
Answers
Suggested answer: D

Explanation:

Reference: https://en.wikipedia.org/wiki/Photoelectric_sensor

As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with third parties outside the organization. What protocol provides the ability to extend the network perimeter with the use of encapsulation and encryption?

A.
File Transfer Protocol (FTP)
A.
File Transfer Protocol (FTP)
Answers
B.
Virtual Local Area Network (VLAN)
B.
Virtual Local Area Network (VLAN)
Answers
C.
Simple Mail Transfer Protocol
C.
Simple Mail Transfer Protocol
Answers
D.
Virtual Private Network (VPN)
D.
Virtual Private Network (VPN)
Answers
Suggested answer: D

Explanation:

Reference: https://searchnetworking.techtarget.com/definition/virtual-private-network

As the CISO, you have been tasked with the execution of the company's key management program.

You MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key control will ensure no single individual can constitute or re-constitute a key?

A.
Dual Control
A.
Dual Control
Answers
B.
Separation of Duties
B.
Separation of Duties
Answers
C.
Split Knowledge
C.
Split Knowledge
Answers
D.
Least Privilege
D.
Least Privilege
Answers
Suggested answer: A

Explanation:

Reference: https://info.townsendsecurity.com/bid/23881/PCI-DSS-2-0-and-Encryption-Key-Management

What is one key difference between Capital expenditures and Operating expenditures?

A.
Operating expense cannot be written off while Capital expense can
A.
Operating expense cannot be written off while Capital expense can
Answers
B.
Operating expenses can be depreciated over time and Capital expenses cannot
B.
Operating expenses can be depreciated over time and Capital expenses cannot
Answers
C.
Capital expenses cannot include salaries and Operating expenses can
C.
Capital expenses cannot include salaries and Operating expenses can
Answers
D.
Capital expenditures allow for the cost to be depreciated over time and Operating does not
D.
Capital expenditures allow for the cost to be depreciated over time and Operating does not
Answers
Suggested answer: C

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?

A.
Segmentation controls.
A.
Segmentation controls.
Answers
B.
Shadow applications.
B.
Shadow applications.
Answers
C.
Deception technology.
C.
Deception technology.
Answers
D.
Vulnerability management.
D.
Vulnerability management.
Answers
Suggested answer: B

Which of the following is an accurate description of a balance sheet?

A.
The percentage of earnings that are retained by the organization for reinvestment in the business
A.
The percentage of earnings that are retained by the organization for reinvestment in the business
Answers
B.
The details of expenses and revenue over a long period of time
B.
The details of expenses and revenue over a long period of time
Answers
C.
A summarized statement of all assets and liabilities at a specific point in time
C.
A summarized statement of all assets and liabilities at a specific point in time
Answers
D.
A review of regulations and requirements impacting the business from a financial perspective
D.
A review of regulations and requirements impacting the business from a financial perspective
Answers
Suggested answer: C

A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is looking to a strategy where attackers are lured into a zone of a safe network where attackers can be monitored, controlled, quarantined, or eradicated.

A.
Moderate investment
A.
Moderate investment
Answers
B.
Passive monitoring
B.
Passive monitoring
Answers
C.
Integrated security controls
C.
Integrated security controls
Answers
D.
Dynamic deception
D.
Dynamic deception
Answers
Suggested answer: D
Total 460 questions
Go to page: of 46