ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?

A.
Compliance to the Payment Card Industry (PCI) regulations.
A.
Compliance to the Payment Card Industry (PCI) regulations.
Answers
B.
Alignment with financial reporting regulations for each country where they operate.
B.
Alignment with financial reporting regulations for each country where they operate.
Answers
C.
Alignment with International Organization for Standardization (ISO) standards.
C.
Alignment with International Organization for Standardization (ISO) standards.
Answers
D.
Compliance with patient data protection regulations for each country where they operate.
D.
Compliance with patient data protection regulations for each country where they operate.
Answers
Suggested answer: D

In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?

A.
The organization uses exclusively a quantitative process to measure risk
A.
The organization uses exclusively a quantitative process to measure risk
Answers
B.
The organization uses exclusively a qualitative process to measure risk
B.
The organization uses exclusively a qualitative process to measure risk
Answers
C.
The organization's risk tolerance is high
C.
The organization's risk tolerance is high
Answers
D.
The organization's risk tolerance is lo
D.
The organization's risk tolerance is lo
Answers
Suggested answer: C

The exposure factor of a threat to your organization is defined by?

A.
Asset value times exposure factor
A.
Asset value times exposure factor
Answers
B.
Annual rate of occurrence
B.
Annual rate of occurrence
Answers
C.
Annual loss expectancy minus current cost of controls
C.
Annual loss expectancy minus current cost of controls
Answers
D.
Percentage of loss experienced due to a realized threat event
D.
Percentage of loss experienced due to a realized threat event
Answers
Suggested answer: D

Risk is defined as:

A.
Threat times vulnerability divided by control
A.
Threat times vulnerability divided by control
Answers
B.
Advisory plus capability plus vulnerability
B.
Advisory plus capability plus vulnerability
Answers
C.
Asset loss times likelihood of event
C.
Asset loss times likelihood of event
Answers
D.
Quantitative plus qualitative impact
D.
Quantitative plus qualitative impact
Answers
Suggested answer: A

What two methods are used to assess risk impact?

A.
Cost and annual rate of expectance
A.
Cost and annual rate of expectance
Answers
B.
Subjective and Objective
B.
Subjective and Objective
Answers
C.
Qualitative and percent of loss realized
C.
Qualitative and percent of loss realized
Answers
D.
Quantitative and qualitative
D.
Quantitative and qualitative
Answers
Suggested answer: D

According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?

A.
Identify threats, risks, impacts and vulnerabilities
A.
Identify threats, risks, impacts and vulnerabilities
Answers
B.
Decide how to manage risk
B.
Decide how to manage risk
Answers
C.
Define the budget of the Information Security Management System
C.
Define the budget of the Information Security Management System
Answers
D.
Define Information Security Policy
D.
Define Information Security Policy
Answers
Suggested answer: D

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

A.
Chief Information Security Officer
A.
Chief Information Security Officer
Answers
B.
Chief Executive Officer
B.
Chief Executive Officer
Answers
C.
Chief Information Officer
C.
Chief Information Officer
Answers
D.
Chief Legal Counsel
D.
Chief Legal Counsel
Answers
Suggested answer: B

The success of the Chief Information Security Officer is MOST dependent upon:

A.
favorable audit findings
A.
favorable audit findings
Answers
B.
following the recommendations of consultants and contractors
B.
following the recommendations of consultants and contractors
Answers
C.
development of relationships with organization executives
C.
development of relationships with organization executives
Answers
D.
raising awareness of security issues with end users
D.
raising awareness of security issues with end users
Answers
Suggested answer: C

An organization information security policy serves to

A.
establish budgetary input in order to meet compliance requirements
A.
establish budgetary input in order to meet compliance requirements
Answers
B.
establish acceptable systems and user behavior
B.
establish acceptable systems and user behavior
Answers
C.
define security configurations for systems
C.
define security configurations for systems
Answers
D.
define relationships with external law enforcement agencies
D.
define relationships with external law enforcement agencies
Answers
Suggested answer: B

Information security policies should be reviewed:

A.
by stakeholders at least annually
A.
by stakeholders at least annually
Answers
B.
by the CISO when new systems are brought online
B.
by the CISO when new systems are brought online
Answers
C.
by the Incident Response team after an audit
C.
by the Incident Response team after an audit
Answers
D.
by internal audit semiannually
D.
by internal audit semiannually
Answers
Suggested answer: A
Total 460 questions
Go to page: of 46