ECCouncil 712-50 Practice Test - Questions Answers, Page 42
List of questions
Related questions
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).
In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
To make sure that the actions of all employees, applications, and systems follow the organization's rules and regulations can BEST be described as which of the following?
You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.
Which of the following is NOT documented in the SSP?
Who should be involved in the development of an internal campaign to address email phishing?
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
Many successful cyber-attacks currently include:
Question