ECCouncil 712-50 Practice Test - Questions Answers, Page 42
List of questions
Question 411
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
Question 412
Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
Question 413
A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).
In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?
Question 414
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
Question 415
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
Question 416
To make sure that the actions of all employees, applications, and systems follow the organization's rules and regulations can BEST be described as which of the following?
Question 417
You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.
Which of the following is NOT documented in the SSP?
Question 418
Who should be involved in the development of an internal campaign to address email phishing?
Question 419
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
Question 420
Many successful cyber-attacks currently include:
Question