ECCouncil 712-50 Practice Test - Questions Answers, Page 8
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 71
 
                            
                            
                                Who is responsible for securing networks during a security incident?
Question 72
 
                            
                            
                                Which of the following is a critical operational component of an Incident Response Program (IRP)?
Question 73
 
                            
                            
                                What is the first thing that needs to be completed in order to create a security program for your organization?
Question 74
 
                            
                            
                                What is the main purpose of the Incident Response Team?
Question 75
 
                            
                            
                                Which of the following is a weakness of an asset or group of assets that can be exploited by one or more threats?
Question 76
 
                            
                            
                                Within an organization's vulnerability management program, who has the responsibility to implement remediation actions?
Question 77
 
                            
                            
                                The Information Security Management program MUST protect:
Question 78
 
                            
                            
                                What is the MAIN reason for conflicts between Information Technology and Information Security programs?
Question 79
 
                            
                            
                                The Information Security Governance program MUST:
Question 80
 
                            
                            
                                A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization's large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
 
        


 
  
                                            
Question