ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.

Which control is MOST important to protect AI products?

A.
Hash datasets
A.
Hash datasets
Answers
B.
Sanitize datasets
B.
Sanitize datasets
Answers
C.
Delete datasets
C.
Delete datasets
Answers
D.
Encrypt datasets
D.
Encrypt datasets
Answers
Suggested answer: D

Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?

A.
Purge
A.
Purge
Answers
B.
Clear
B.
Clear
Answers
C.
Mangle
C.
Mangle
Answers
D.
Destroy
D.
Destroy
Answers
Suggested answer: B

Explanation:

Reference: https://it.brown.edu/computing-policies/electronic-equipment-disposition-policy/dataremoval-recommendations

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

A.
Recovery Point Objective (RPO)
A.
Recovery Point Objective (RPO)
Answers
B.
Mean Time to Delivery (MTD)
B.
Mean Time to Delivery (MTD)
Answers
C.
Recovery Time Objective (RTO)
C.
Recovery Time Objective (RTO)
Answers
D.
Maximum Tolerable Downtime (MTD)
D.
Maximum Tolerable Downtime (MTD)
Answers
Suggested answer: C

Explanation:

Reference: https://www.druva.com/glossary/what-is-a-recovery-point-objective-definition-andrelatedfaqs/#:~:text=The%20recovery%20time%20objective%20(RTO,consequences%20associated%20with%20the%20disruption

A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:

A.
Inability to export the private certificate/key
A.
Inability to export the private certificate/key
Answers
B.
It can double as physical identification at the DMV
B.
It can double as physical identification at the DMV
Answers
C.
It has the user's photograph to help ID them
C.
It has the user's photograph to help ID them
Answers
D.
It can be used as a secure flash drive
D.
It can be used as a secure flash drive
Answers
Suggested answer: C

Explanation:

Reference: https://www.securew2.com/blog/piv-personal-identity-verification

When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?

A.
RAM and unallocated space
A.
RAM and unallocated space
Answers
B.
Unallocated space and RAM
B.
Unallocated space and RAM
Answers
C.
Slack space and browser cache
C.
Slack space and browser cache
Answers
D.
Persistent and volatile data
D.
Persistent and volatile data
Answers
Suggested answer: D

Explanation:

Reference: https://study.com/academy/lesson/data-storage-formats-digital-forensics-devicestypes.html

To make sure that the actions of all employees, applications, and systems follow the organization's rules and regulations can BEST be described as which of the following?

A.
Compliance management
A.
Compliance management
Answers
B.
Asset management
B.
Asset management
Answers
C.
Risk management
C.
Risk management
Answers
D.
Security management
D.
Security management
Answers
Suggested answer: D

Explanation:

Reference: https://www.eccouncil.org/information-security-management/

You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.

Which of the following is NOT documented in the SSP?

A.
The controls in place to secure the system
A.
The controls in place to secure the system
Answers
B.
Name of the connected system
B.
Name of the connected system
Answers
C.
The results of a third-party audits and recommendations
C.
The results of a third-party audits and recommendations
Answers
D.
Type of information used in the system
D.
Type of information used in the system
Answers
Suggested answer: C

Explanation:

Reference: https://www.govinfo.gov/content/pkg/GOVPUB-C13-63e84ab7af43b36228f10e4f0b5f8c38/pdf/GOVPUB-C13-63e84ab7af43b36228f10e4f0b5f8c38.pdf (65)

Who should be involved in the development of an internal campaign to address email phishing?

A.
Business unit leaders, CIO, CEO
A.
Business unit leaders, CIO, CEO
Answers
B.
Business Unite Leaders, CISO, CIO and CEO
B.
Business Unite Leaders, CISO, CIO and CEO
Answers
C.
All employees
C.
All employees
Answers
D.
CFO, CEO, CIO
D.
CFO, CEO, CIO
Answers
Suggested answer: B

Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?

A.
Virtual
A.
Virtual
Answers
B.
Dedicated
B.
Dedicated
Answers
C.
Fusion
C.
Fusion
Answers
D.
Command
D.
Command
Answers
Suggested answer: A

Explanation:

Reference: https://www.techtarget.com/searchsecurity/definition/Security-Operations-Center-SOC

Many successful cyber-attacks currently include:

A.
Phishing Attacks
A.
Phishing Attacks
Answers
B.
Misconfigurations
B.
Misconfigurations
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
All of these
D.
All of these
Answers
Suggested answer: C

Explanation:

Reference: https://www.eccouncil.org/what-is-social-engineering/

Total 460 questions
Go to page: of 46