ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 46

Question list
Search
Search

Related questions











A company wants to fill a Chief Information Security Officer position. Which of the following qualifications and experience would be MOST desirable in a candidate?

A.
Multiple certifications, strong technical capabilities and lengthy resume
A.
Multiple certifications, strong technical capabilities and lengthy resume
Answers
B.
Industry certifications, technical knowledge and program management skills
B.
Industry certifications, technical knowledge and program management skills
Answers
C.
College degree, audit capabilities and complex project management
C.
College degree, audit capabilities and complex project management
Answers
D.
Multiple references, strong background check and industry certifications
D.
Multiple references, strong background check and industry certifications
Answers
Suggested answer: B

What is the THIRD state of the Tuckman Stages of Group Development?

A.
Performing
A.
Performing
Answers
B.
Norming
B.
Norming
Answers
C.
Storming
C.
Storming
Answers
D.
Forming
D.
Forming
Answers
Suggested answer: B

A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to organizational implementation and management requirements. Which of the following principles does this BEST demonstrate?

A.
Proper budget management
A.
Proper budget management
Answers
B.
Leveraging existing implementations
B.
Leveraging existing implementations
Answers
C.
Alignment with the business
C.
Alignment with the business
Answers
D.
Effective use of existing technologies
D.
Effective use of existing technologies
Answers
Suggested answer: C

Which of the following is the MOST important to share with an Information Security Steering Committee:

A.
Include a mix of members from different departments and staff levels
A.
Include a mix of members from different departments and staff levels
Answers
B.
Review audit and compliance reports
B.
Review audit and compliance reports
Answers
C.
Ensure that security policies and procedures have been vetted and approved
C.
Ensure that security policies and procedures have been vetted and approved
Answers
D.
Be briefed about new trends and products at each meeting by a vendor
D.
Be briefed about new trends and products at each meeting by a vendor
Answers
Suggested answer: B

You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?

A.
Payment Card Industry (PCI) Data Security Standard (DSS)
A.
Payment Card Industry (PCI) Data Security Standard (DSS)
Answers
B.
ISO 27002
B.
ISO 27002
Answers
C.
NIST Cybersecurity Framework
C.
NIST Cybersecurity Framework
Answers
D.
The Federal Risk and Authorization Management Program (FedRAMP)
D.
The Federal Risk and Authorization Management Program (FedRAMP)
Answers
Suggested answer: A

Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?

A.
Business Impact Analysis
A.
Business Impact Analysis
Answers
B.
Cost-benefit analysis
B.
Cost-benefit analysis
Answers
C.
Economic impact analysis
C.
Economic impact analysis
Answers
D.
Return on Investment
D.
Return on Investment
Answers
Suggested answer: B

The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:

A.
Security controls group
A.
Security controls group
Answers
B.
Governance, risk, and compliance tools
B.
Governance, risk, and compliance tools
Answers
C.
Security Threat and vulnerability management process
C.
Security Threat and vulnerability management process
Answers
D.
Risk assessment process
D.
Risk assessment process
Answers
Suggested answer: C

Many successful cyber-attacks currently include:

A.
Phishing Attacks
A.
Phishing Attacks
Answers
B.
Misconfigurations
B.
Misconfigurations
Answers
C.
All of these
C.
All of these
Answers
D.
Social engineering
D.
Social engineering
Answers
Suggested answer: C

What is the purpose of the statement of retained earnings of an organization?

A.
It represents the sum of all capital expenditures
A.
It represents the sum of all capital expenditures
Answers
B.
It represents the percentage of earnings that could in part be used to finance future security controls
B.
It represents the percentage of earnings that could in part be used to finance future security controls
Answers
C.
It represents the savings generated by the proper acquisition and implementation of security controls
C.
It represents the savings generated by the proper acquisition and implementation of security controls
Answers
D.
It has a direct correlation with the CISO's budget
D.
It has a direct correlation with the CISO's budget
Answers
Suggested answer: B

Which of the following is considered the MOST effective tool against social engineering?

A.
Anti-phishing tools
A.
Anti-phishing tools
Answers
B.
Effective Security awareness program
B.
Effective Security awareness program
Answers
C.
Anti-malware tools
C.
Anti-malware tools
Answers
D.
Effective Security Vulnerability Management Program
D.
Effective Security Vulnerability Management Program
Answers
Suggested answer: B
Total 460 questions
Go to page: of 46