ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 43

Question list
Search
Search

Related questions











When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:

A.
Patch management
A.
Patch management
Answers
B.
Network monitoring
B.
Network monitoring
Answers
C.
Ability to provide security services tailored to the business' needs
C.
Ability to provide security services tailored to the business' needs
Answers
D.
24/7 tollfree number
D.
24/7 tollfree number
Answers
Suggested answer: C

Explanation:

Reference: https://digitalguardian.com/blog/how-hire-evaluate-managed-security-serviceproviders-mssps

Which of the following strategies provides the BEST response to a ransomware attack?

A.
Real-time off-site replication
A.
Real-time off-site replication
Answers
B.
Daily incremental backup
B.
Daily incremental backup
Answers
C.
Daily full backup
C.
Daily full backup
Answers
D.
Daily differential backup
D.
Daily differential backup
Answers
Suggested answer: B

What is the MOST critical output of the incident response process?

A.
A complete document of all involved team members and the support they provided
A.
A complete document of all involved team members and the support they provided
Answers
B.
Recovery of all data from affected systems
B.
Recovery of all data from affected systems
Answers
C.
Lessons learned from the incident, so they can be incorporated into the incident response processes
C.
Lessons learned from the incident, so they can be incorporated into the incident response processes
Answers
D.
Clearly defined documents detailing standard evidence collection and preservation processes
D.
Clearly defined documents detailing standard evidence collection and preservation processes
Answers
Suggested answer: C

Explanation:

Reference: https://www.eccouncil.org/incident-response-plan-phases/

Who is responsible for verifying that audit directives are implemented?

A.
IT Management
A.
IT Management
Answers
B.
Internal Audit
B.
Internal Audit
Answers
C.
IT Security
C.
IT Security
Answers
D.
BOD Audit Committee
D.
BOD Audit Committee
Answers
Suggested answer: B

Explanation:

Reference: https://www.eccouncil.org/information-security-management/

XYZ is a publicly-traded software development company.

Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?

A.
Chief Financial Officer (CFO)
A.
Chief Financial Officer (CFO)
Answers
B.
Chief Software Architect (CIO)
B.
Chief Software Architect (CIO)
Answers
C.
CISO
C.
CISO
Answers
D.
Chief Executive Officer (CEO)
D.
Chief Executive Officer (CEO)
Answers
Suggested answer: C

Explanation:

Reference: https://www.eccouncil.org/information-security-management/

What organizational structure combines the functional and project structures to create a hybrid of the two?

A.
Traditional
A.
Traditional
Answers
B.
Composite
B.
Composite
Answers
C.
Project
C.
Project
Answers
D.
Matrix
D.
Matrix
Answers
Suggested answer: D

Explanation:

Reference: https://www.knowledgehut.com/tutorials/project-management/organization-structures

The primary responsibility for assigning entitlements to a network share lies with which role?

A.
CISO
A.
CISO
Answers
B.
Data owner
B.
Data owner
Answers
C.
Chief Information Officer (CIO)
C.
Chief Information Officer (CIO)
Answers
D.
Security system administrator
D.
Security system administrator
Answers
Suggested answer: B

Explanation:

Reference: https://resources.infosecinstitute.com/certification/data-and-system-ownership/

What does RACI stand for?

A.
Reasonable, Actionable, Controlled, and Implemented
A.
Reasonable, Actionable, Controlled, and Implemented
Answers
B.
Responsible, Actors, Consult, and Instigate
B.
Responsible, Actors, Consult, and Instigate
Answers
C.
Responsible, Accountable, Consulted, and Informed
C.
Responsible, Accountable, Consulted, and Informed
Answers
D.
Review, Act, Communicate, and Inform
D.
Review, Act, Communicate, and Inform
Answers
Suggested answer: C

Explanation:

Reference:

https://www.google.com/search?q=What+does+RACI+stand+for&oq=What+does+RACI+stand+for&aqs=edge..69i57.220j0j4&sourceid=chrome&ie=UTF-8

What key technology can mitigate ransomware threats?

A.
Use immutable data storage
A.
Use immutable data storage
Answers
B.
Phishing exercises
B.
Phishing exercises
Answers
C.
Application of multiple end point anti-malware solutions
C.
Application of multiple end point anti-malware solutions
Answers
D.
Blocking use of wireless networks
D.
Blocking use of wireless networks
Answers
Suggested answer: A

Explanation:

Reference: https://cloud.google.com/blog/products/identity-security/5-pillars-of-protection-toprevent-ransomware-attacks

Which of the following are the triple constraints of project management?

A.
Time, quality, and scope
A.
Time, quality, and scope
Answers
B.
Cost, quality, and time
B.
Cost, quality, and time
Answers
C.
Scope, time, and cost
C.
Scope, time, and cost
Answers
D.
Quality, scope, and cost
D.
Quality, scope, and cost
Answers
Suggested answer: C

Explanation:

Reference: https://www.teamgantt.com/blog/triple-constraint-projectmanagement#:~:text=Each%20side%20or%20point%20of,scope%2C%20time%2C%20and%20cost

Total 460 questions
Go to page: of 46