ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 42

Add to Whishlist

List of questions

Question 411

Report Export Collapse

You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.

Which control is MOST important to protect AI products?

Become a Premium Member for full access
  Unlock Premium Member

Question 412

Report Export Collapse

Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?

Become a Premium Member for full access
  Unlock Premium Member

Question 413

Report Export Collapse

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

Become a Premium Member for full access
  Unlock Premium Member

Question 414

Report Export Collapse

A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:

Become a Premium Member for full access
  Unlock Premium Member

Question 415

Report Export Collapse

When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 416

Report Export Collapse

To make sure that the actions of all employees, applications, and systems follow the organization's rules and regulations can BEST be described as which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 417

Report Export Collapse

You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.

Which of the following is NOT documented in the SSP?

Become a Premium Member for full access
  Unlock Premium Member

Question 418

Report Export Collapse

Who should be involved in the development of an internal campaign to address email phishing?

Become a Premium Member for full access
  Unlock Premium Member

Question 419

Report Export Collapse

Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?

Become a Premium Member for full access
  Unlock Premium Member

Question 420

Report Export Collapse

Many successful cyber-attacks currently include:

Become a Premium Member for full access
  Unlock Premium Member
Total 460 questions
Go to page: of 46
Search

Related questions