ECCouncil 712-50 Practice Test - Questions Answers, Page 42
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 411
 
                            
                            
                                You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
Question 412
 
                            
                            
                                Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
Question 413
 
                            
                            
                                A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).
In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?
Question 414
 
                            
                            
                                A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
Question 415
 
                            
                            
                                When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
Question 416
 
                            
                            
                                To make sure that the actions of all employees, applications, and systems follow the organization's rules and regulations can BEST be described as which of the following?
Question 417
 
                            
                            
                                You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.
Which of the following is NOT documented in the SSP?
Question 418
 
                            
                            
                                Who should be involved in the development of an internal campaign to address email phishing?
Question 419
 
                            
                            
                                Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
Question 420
 
                            
                            
                                Many successful cyber-attacks currently include:
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question