ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Which of the following intellectual Property components is focused on maintaining brand recognition?

A.
Trademark
A.
Trademark
Answers
B.
Patent
B.
Patent
Answers
C.
Research Logs
C.
Research Logs
Answers
D.
Copyright
D.
Copyright
Answers
Suggested answer: A

The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:

A.
Due Protection
A.
Due Protection
Answers
B.
Due Care
B.
Due Care
Answers
C.
Due Compromise
C.
Due Compromise
Answers
D.
Due process
D.
Due process
Answers
Suggested answer: B

When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?

A.
How many credit card records are stored?
A.
How many credit card records are stored?
Answers
B.
How many servers do you have?
B.
How many servers do you have?
Answers
C.
What is the scope of the certification?
C.
What is the scope of the certification?
Answers
D.
What is the value of the assets at risk?
D.
What is the value of the assets at risk?
Answers
Suggested answer: C

What is a difference from the list below between quantitative and qualitative Risk Assessment?

A.
Quantitative risk assessments result in an exact number (in monetary terms)
A.
Quantitative risk assessments result in an exact number (in monetary terms)
Answers
B.
Qualitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
B.
Qualitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
Answers
C.
Qualitative risk assessments map to business objectives
C.
Qualitative risk assessments map to business objectives
Answers
D.
Quantitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
D.
Quantitative risk assessments result in a quantitative assessment (high, medium, low, red, yellow, green)
Answers
Suggested answer: A

What is the definition of Risk in Information Security?

A.
Risk = Probability x Impact
A.
Risk = Probability x Impact
Answers
B.
Risk = Threat x Probability
B.
Risk = Threat x Probability
Answers
C.
Risk = Financial Impact x Probability
C.
Risk = Financial Impact x Probability
Answers
D.
Risk = Impact x Threat
D.
Risk = Impact x Threat
Answers
Suggested answer: A

Quantitative Risk Assessments have the following advantages over qualitative risk assessments:

A.
They are objective and can express risk / cost in real numbers
A.
They are objective and can express risk / cost in real numbers
Answers
B.
They are subjective and can be completed more quickly
B.
They are subjective and can be completed more quickly
Answers
C.
They are objective and express risk / cost in approximates
C.
They are objective and express risk / cost in approximates
Answers
D.
They are subjective and can express risk /cost in real numbers
D.
They are subjective and can express risk /cost in real numbers
Answers
Suggested answer: A

Which of the following is MOST important when dealing with an Information Security Steering committee:

A.
Include a mix of members from different departments and staff levels.
A.
Include a mix of members from different departments and staff levels.
Answers
B.
Ensure that security policies and procedures have been vetted and approved.
B.
Ensure that security policies and procedures have been vetted and approved.
Answers
C.
Review all past audit and compliance reports.
C.
Review all past audit and compliance reports.
Answers
D.
Be briefed about new trends and products at each meeting by a vendor.
D.
Be briefed about new trends and products at each meeting by a vendor.
Answers
Suggested answer: C

A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?

A.
Enforce the existing security standards and do not allow the deployment of the new technology.
A.
Enforce the existing security standards and do not allow the deployment of the new technology.
Answers
B.
Amend the standard to permit the deployment.
B.
Amend the standard to permit the deployment.
Answers
C.
If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.
C.
If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.
Answers
D.
Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.
D.
Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.
Answers
Suggested answer: C

The PRIMARY objective of security awareness is to:

A.
Ensure that security policies are read.
A.
Ensure that security policies are read.
Answers
B.
Encourage security-conscious employee behavior.
B.
Encourage security-conscious employee behavior.
Answers
C.
Meet legal and regulatory requirements.
C.
Meet legal and regulatory requirements.
Answers
D.
Put employees on notice in case follow-up action for noncompliance is necessary
D.
Put employees on notice in case follow-up action for noncompliance is necessary
Answers
Suggested answer: B

Which of the following is MOST likely to be discretionary?

A.
Policies
A.
Policies
Answers
B.
Procedures
B.
Procedures
Answers
C.
Guidelines
C.
Guidelines
Answers
D.
Standards
D.
Standards
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46