ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 40

Question list
Search
Search

Related questions











What is the difference between encryption and tokenization?

A.
Tokenization combined with hashing is always better than encryption
A.
Tokenization combined with hashing is always better than encryption
Answers
B.
Encryption can be mathematically reversed to provide the original information
B.
Encryption can be mathematically reversed to provide the original information
Answers
C.
The token contains the all original information
C.
The token contains the all original information
Answers
D.
Tokenization can be mathematically reversed to provide the original information
D.
Tokenization can be mathematically reversed to provide the original information
Answers
Suggested answer: B

Explanation:

Reference: http://library.ahima.org/doc?oid=104090#.X_dwWolR3eQ

Which of the following information would MOST likely be reported at the board-level within an organization?

A.
System scanning trends and results as they pertain to insider and external threat sources
A.
System scanning trends and results as they pertain to insider and external threat sources
Answers
B.
The capabilities of a security program in terms of staffing support
B.
The capabilities of a security program in terms of staffing support
Answers
C.
Significant risks and security incidents that have been discovered since the last assembly of the membership
C.
Significant risks and security incidents that have been discovered since the last assembly of the membership
Answers
D.
The numbers and types of cyberattacks experienced by the organization since the last assembly of the membership
D.
The numbers and types of cyberattacks experienced by the organization since the last assembly of the membership
Answers
Suggested answer: C

Which technology can provide a computing environment without requiring a dedicated hardware backend?

A.
Mainframe server
A.
Mainframe server
Answers
B.
Virtual Desktop
B.
Virtual Desktop
Answers
C.
Thin client
C.
Thin client
Answers
D.
Virtual Local Area Network
D.
Virtual Local Area Network
Answers
Suggested answer: B

What process defines the framework of rules and practices by which a board of directors ensure accountability, fairness and transparency in an organization's relationship with its shareholders?

A.
Internal Audit
A.
Internal Audit
Answers
B.
Corporate governance
B.
Corporate governance
Answers
C.
Risk Oversight
C.
Risk Oversight
Answers
D.
Key Performance Indicators
D.
Key Performance Indicators
Answers
Suggested answer: B

Explanation:

Reference: https://www.igi-global.com/dictionary/corporate-governance/5957

As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?

A.
Recovery Point Objective (RPO)
A.
Recovery Point Objective (RPO)
Answers
B.
Disaster Recovery Plan
B.
Disaster Recovery Plan
Answers
C.
Recovery Time Objective (RTO)
C.
Recovery Time Objective (RTO)
Answers
D.
Business Continuity Plan
D.
Business Continuity Plan
Answers
Suggested answer: D

Explanation:

Reference: https://www.resolver.com/resource/bcdr-metrics-that-matter/

What are the three hierarchically related aspects of strategic planning and in which order should they be done?

A.
1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity or information security strategic planning
A.
1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity or information security strategic planning
Answers
B.
1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Information technology strategic planning
B.
1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Information technology strategic planning
Answers
C.
1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity or information security strategic planning
C.
1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity or information security strategic planning
Answers
D.
1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Information technology strategic planning
D.
1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Information technology strategic planning
Answers
Suggested answer: D

Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?

A.
ITIL
A.
ITIL
Answers
B.
Privacy Act
B.
Privacy Act
Answers
C.
Sarbanes Oxley
C.
Sarbanes Oxley
Answers
D.
PCI-DSS
D.
PCI-DSS
Answers
Suggested answer: B

Which of the following would negatively impact a log analysis of a multinational organization?

A.
Centralized log management
A.
Centralized log management
Answers
B.
Encrypted log files in transit
B.
Encrypted log files in transit
Answers
C.
Each node set to local time
C.
Each node set to local time
Answers
D.
Log aggregation agent each node
D.
Log aggregation agent each node
Answers
Suggested answer: D

Explanation:

Topic 6, Misc. Questions

Which of the following statements below regarding Key Performance indicators (KPIs) are true?

A.
Development of KPI's are most useful when done independently
A.
Development of KPI's are most useful when done independently
Answers
B.
They are a strictly quantitative measure of success
B.
They are a strictly quantitative measure of success
Answers
C.
They should be standard throughout the organization versus domain-specific so they are more easily correlated
C.
They should be standard throughout the organization versus domain-specific so they are more easily correlated
Answers
D.
They are a strictly qualitative measure of success
D.
They are a strictly qualitative measure of success
Answers
Suggested answer: A

Explanation:

Reference: https://kpi.org/KPI-Basics/KPI-Development

When information security falls under the Chief Information Officer (CIO), what is their MOST essential role?

A.
Oversees the organization's day-to-day operations, creating the policies and strategies that govern operations
A.
Oversees the organization's day-to-day operations, creating the policies and strategies that govern operations
Answers
B.
Enlisting support from key executives the information security program budget and policies
B.
Enlisting support from key executives the information security program budget and policies
Answers
C.
Charged with developing and implementing policies designed to protect employees and customers' data from unauthorized access
C.
Charged with developing and implementing policies designed to protect employees and customers' data from unauthorized access
Answers
D.
Responsible for the success or failure of the IT organization and setting strategic direction
D.
Responsible for the success or failure of the IT organization and setting strategic direction
Answers
Suggested answer: D

Explanation:

Reference: https://www.investopedia.com/terms/c/cio.asp

Total 460 questions
Go to page: of 46