ECCouncil 712-50 Practice Test - Questions Answers, Page 42

List of questions
Question 411

You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
Question 412

Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
Question 413

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).
In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?
Question 414

A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
Question 415

When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
Question 416

To make sure that the actions of all employees, applications, and systems follow the organization's rules and regulations can BEST be described as which of the following?
Question 417

You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.
Which of the following is NOT documented in the SSP?
Question 418

Who should be involved in the development of an internal campaign to address email phishing?
Question 419

Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
Question 420

Many successful cyber-attacks currently include:
Question