ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Related questions











Why is it vitally important that senior management endorse a security policy?

A.
So that they will accept ownership for security within the organization.
A.
So that they will accept ownership for security within the organization.
Answers
B.
So that employees will follow the policy directives.
B.
So that employees will follow the policy directives.
Answers
C.
So that external bodies will recognize the organizations commitment to security.
C.
So that external bodies will recognize the organizations commitment to security.
Answers
D.
So that they can be held legally accountable.
D.
So that they can be held legally accountable.
Answers
Suggested answer: A

When would it be more desirable to develop a set of decentralized security policies and procedures within an enterprise environment?

A.
When there is a need to develop a more unified incident response capability.
A.
When there is a need to develop a more unified incident response capability.
Answers
B.
When the enterprise is made up of many business units with diverse business activities, risks profiles and regulatory requirements.
B.
When the enterprise is made up of many business units with diverse business activities, risks profiles and regulatory requirements.
Answers
C.
When there is a variety of technologies deployed in the infrastructure.
C.
When there is a variety of technologies deployed in the infrastructure.
Answers
D.
When it results in an overall lower cost of operating the security program.
D.
When it results in an overall lower cost of operating the security program.
Answers
Suggested answer: B

What is the relationship between information protection and regulatory compliance?

A.
That all information in an organization must be protected equally.
A.
That all information in an organization must be protected equally.
Answers
B.
The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
B.
The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
Answers
C.
That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
C.
That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
Answers
D.
There is no relationship between the two.
D.
There is no relationship between the two.
Answers
Suggested answer: C

Regulatory requirements typically force organizations to implement

A.
Mandatory controls
A.
Mandatory controls
Answers
B.
Discretionary controls
B.
Discretionary controls
Answers
C.
Optional controls
C.
Optional controls
Answers
D.
Financial controls
D.
Financial controls
Answers
Suggested answer: A

When managing the security architecture for your company you must consider:

A.
Security and IT Staff size
A.
Security and IT Staff size
Answers
B.
Company Values
B.
Company Values
Answers
C.
Budget
C.
Budget
Answers
D.
All of the above
D.
All of the above
Answers
Suggested answer: D

If your organization operates under a model of "assumption of breach", you should:

A.
Protect all information resource assets equally
A.
Protect all information resource assets equally
Answers
B.
Establish active firewall monitoring protocols
B.
Establish active firewall monitoring protocols
Answers
C.
Purchase insurance for your compliance liability
C.
Purchase insurance for your compliance liability
Answers
D.
Focus your security efforts on high value assets
D.
Focus your security efforts on high value assets
Answers
Suggested answer: C

A method to transfer risk is to:

A.
Implement redundancy
A.
Implement redundancy
Answers
B.
move operations to another region
B.
move operations to another region
Answers
C.
purchase breach insurance
C.
purchase breach insurance
Answers
D.
Alignment with business operations
D.
Alignment with business operations
Answers
Suggested answer: C

You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the

A.
Controlled mitigation effort
A.
Controlled mitigation effort
Answers
B.
Risk impact comparison
B.
Risk impact comparison
Answers
C.
Relative likelihood of event
C.
Relative likelihood of event
Answers
D.
Comparative threat analysis
D.
Comparative threat analysis
Answers
Suggested answer: C

Ensuring that the actions of a set of people, applications and systems follow the organization's rules is BEST described as:

A.
Risk management
A.
Risk management
Answers
B.
Security management
B.
Security management
Answers
C.
Mitigation management
C.
Mitigation management
Answers
D.
Compliance management
D.
Compliance management
Answers
Suggested answer: D

A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?

A.
Audit validation
A.
Audit validation
Answers
B.
Physical control testing
B.
Physical control testing
Answers
C.
Compliance management
C.
Compliance management
Answers
D.
Security awareness training
D.
Security awareness training
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46