ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?

The asset owner
The asset owner
The asset manager
The asset manager
The data custodian
The data custodian
The project manager
The project manager
Suggested answer: A
asked 18/09/2024
Christophe Troessaert
42 questions

Question 82

Report Export Collapse

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

Audit and Legal
Audit and Legal
Budget and Compliance
Budget and Compliance
Human Resources and Budget
Human Resources and Budget
Legal and Human Resources
Legal and Human Resources
Suggested answer: A
asked 18/09/2024
Manohar M
46 questions

Question 83

Report Export Collapse

Risk appetite directly affects what part of a vulnerability management program?

Staff
Staff
Scope
Scope
Schedule
Schedule
Scan tools
Scan tools
Suggested answer: B
asked 18/09/2024
Jonathan Moreno
33 questions

Question 84

Report Export Collapse

When choosing a risk mitigation method what is the MOST important factor?

Approval from the board of directors
Approval from the board of directors
Cost of the mitigation is less than the risk
Cost of the mitigation is less than the risk
Metrics of mitigation method success
Metrics of mitigation method success
Mitigation method complies with PCI regulations
Mitigation method complies with PCI regulations
Suggested answer: B
asked 18/09/2024
Leonelo Sanchez
34 questions

Question 85

Report Export Collapse

Payment Card Industry (PCI) compliance requirements are based on what criteria?

The types of cardholder data retained
The types of cardholder data retained
The duration card holder data is retained
The duration card holder data is retained
The size of the organization processing credit card data
The size of the organization processing credit card data
The number of transactions performed per year by an organization
The number of transactions performed per year by an organization
Suggested answer: D
asked 18/09/2024
Rehan Malik
54 questions

Question 86

Report Export Collapse

Which of the following provides an audit framework?

Control Objectives for IT (COBIT)
Control Objectives for IT (COBIT)
Payment Card Industry-Data Security Standard (PCI-DSS)
Payment Card Industry-Data Security Standard (PCI-DSS)
International Organization Standard (ISO) 27002
International Organization Standard (ISO) 27002
National Institute of Standards and Technology (NIST) SP 800-30
National Institute of Standards and Technology (NIST) SP 800-30
Suggested answer: A
asked 18/09/2024
Marian Mateev
42 questions

Question 87

Report Export Collapse

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?

Awareness
Awareness
Compliance
Compliance
Governance
Governance
Management
Management
Suggested answer: C
asked 18/09/2024
Sivagami Narayanan
54 questions

Question 88

Report Export Collapse

Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?

Reduction of budget
Reduction of budget
Decreased security awareness
Decreased security awareness
Improper use of information resources
Improper use of information resources
Fines for regulatory non-compliance
Fines for regulatory non-compliance
Suggested answer: D
asked 18/09/2024
Jonathan Ang
40 questions

Question 89

Report Export Collapse

The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for

Confidentiality, Integrity and Availability
Confidentiality, Integrity and Availability
Assurance, Compliance and Availability
Assurance, Compliance and Availability
International Compliance
International Compliance
Integrity and Availability
Integrity and Availability
Suggested answer: A
asked 18/09/2024
Wojciech Romaldowski
49 questions

Question 90

Report Export Collapse

When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it

In promiscuous mode and only detect malicious traffic.
In promiscuous mode and only detect malicious traffic.
In-line and turn on blocking mode to stop malicious traffic.
In-line and turn on blocking mode to stop malicious traffic.
In promiscuous mode and block malicious traffic.
In promiscuous mode and block malicious traffic.
In-line and turn on alert mode to stop malicious traffic.
In-line and turn on alert mode to stop malicious traffic.
Suggested answer: B
asked 18/09/2024
Kevin Lizano
38 questions
Total 460 questions
Go to page: of 46

Related questions