ECCouncil 712-50 Practice Test - Questions Answers, Page 9

List of questions
Question 81

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
Question 82

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
Question 83

Risk appetite directly affects what part of a vulnerability management program?
Question 84

When choosing a risk mitigation method what is the MOST important factor?
Question 85

Payment Card Industry (PCI) compliance requirements are based on what criteria?
Question 86

Which of the following provides an audit framework?
Question 87

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
Question 88

Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?
Question 89

The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for
Question 90

When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
Question