ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?

Compliance to the Payment Card Industry (PCI) regulations.
Compliance to the Payment Card Industry (PCI) regulations.
Alignment with financial reporting regulations for each country where they operate.
Alignment with financial reporting regulations for each country where they operate.
Alignment with International Organization for Standardization (ISO) standards.
Alignment with International Organization for Standardization (ISO) standards.
Compliance with patient data protection regulations for each country where they operate.
Compliance with patient data protection regulations for each country where they operate.
Suggested answer: D
asked 18/09/2024
Samer Chaar
31 questions

Question 62

Report Export Collapse

In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?

The organization uses exclusively a quantitative process to measure risk
The organization uses exclusively a quantitative process to measure risk
The organization uses exclusively a qualitative process to measure risk
The organization uses exclusively a qualitative process to measure risk
The organization's risk tolerance is high
The organization's risk tolerance is high
The organization's risk tolerance is lo
The organization's risk tolerance is lo
Suggested answer: C
asked 18/09/2024
Ellee Chen
47 questions

Question 63

Report Export Collapse

The exposure factor of a threat to your organization is defined by?

Asset value times exposure factor
Asset value times exposure factor
Annual rate of occurrence
Annual rate of occurrence
Annual loss expectancy minus current cost of controls
Annual loss expectancy minus current cost of controls
Percentage of loss experienced due to a realized threat event
Percentage of loss experienced due to a realized threat event
Suggested answer: D
asked 18/09/2024
Borja Arranz Palenzuela
47 questions

Question 64

Report Export Collapse

Risk is defined as:

Threat times vulnerability divided by control
Threat times vulnerability divided by control
Advisory plus capability plus vulnerability
Advisory plus capability plus vulnerability
Asset loss times likelihood of event
Asset loss times likelihood of event
Quantitative plus qualitative impact
Quantitative plus qualitative impact
Suggested answer: A
asked 18/09/2024
saharat pinsaran
49 questions

Question 65

Report Export Collapse

What two methods are used to assess risk impact?

Cost and annual rate of expectance
Cost and annual rate of expectance
Subjective and Objective
Subjective and Objective
Qualitative and percent of loss realized
Qualitative and percent of loss realized
Quantitative and qualitative
Quantitative and qualitative
Suggested answer: D
asked 18/09/2024
Gufran Dalwai
52 questions

Question 66

Report Export Collapse

According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?

Identify threats, risks, impacts and vulnerabilities
Identify threats, risks, impacts and vulnerabilities
Decide how to manage risk
Decide how to manage risk
Define the budget of the Information Security Management System
Define the budget of the Information Security Management System
Define Information Security Policy
Define Information Security Policy
Suggested answer: D
asked 18/09/2024
Barry Higgins
41 questions

Question 67

Report Export Collapse

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

Chief Information Security Officer
Chief Information Security Officer
Chief Executive Officer
Chief Executive Officer
Chief Information Officer
Chief Information Officer
Chief Legal Counsel
Chief Legal Counsel
Suggested answer: B
asked 18/09/2024
bebo here
51 questions

Question 68

Report Export Collapse

The success of the Chief Information Security Officer is MOST dependent upon:

favorable audit findings
favorable audit findings
following the recommendations of consultants and contractors
following the recommendations of consultants and contractors
development of relationships with organization executives
development of relationships with organization executives
raising awareness of security issues with end users
raising awareness of security issues with end users
Suggested answer: C
asked 18/09/2024
Peter Avino
40 questions

Question 69

Report Export Collapse

An organization information security policy serves to

establish budgetary input in order to meet compliance requirements
establish budgetary input in order to meet compliance requirements
establish acceptable systems and user behavior
establish acceptable systems and user behavior
define security configurations for systems
define security configurations for systems
define relationships with external law enforcement agencies
define relationships with external law enforcement agencies
Suggested answer: B
asked 18/09/2024
Siphiwe Soldat
39 questions

Question 70

Report Export Collapse

Information security policies should be reviewed:

by stakeholders at least annually
by stakeholders at least annually
by the CISO when new systems are brought online
by the CISO when new systems are brought online
by the Incident Response team after an audit
by the Incident Response team after an audit
by internal audit semiannually
by internal audit semiannually
Suggested answer: A
asked 18/09/2024
Vanildo Pedro
46 questions
Total 460 questions
Go to page: of 46

Related questions