ECCouncil 712-50 Practice Test - Questions Answers, Page 41
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 401
 
                            
                            
                                APLU Limited has recently suffered a security breach with customers' social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
Question 402
 
                            
                            
                                An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
Question 403
 
                            
                            
                                The main purpose of the SOC is:
Question 404
 
                            
                            
                                When obtaining new products and services, why is it essential to collaborate with lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others?
Question 405
 
                            
                            
                                A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
Question 406
 
                            
                            
                                When reviewing a Solution as a Service (SaaS) provider's security health and posture, which key document should you review?
Question 407
 
                            
                            
                                As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
Question 408
 
                            
                            
                                What is a Statement of Objectives (SOA)?
Question 409
 
                            
                            
                                During a cyber incident, which non-security personnel might be needed to assist the security team?
Question 410
 
                            
                            
                                With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question