ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?

A.
The asset owner
A.
The asset owner
Answers
B.
The asset manager
B.
The asset manager
Answers
C.
The data custodian
C.
The data custodian
Answers
D.
The project manager
D.
The project manager
Answers
Suggested answer: A

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

A.
Audit and Legal
A.
Audit and Legal
Answers
B.
Budget and Compliance
B.
Budget and Compliance
Answers
C.
Human Resources and Budget
C.
Human Resources and Budget
Answers
D.
Legal and Human Resources
D.
Legal and Human Resources
Answers
Suggested answer: A

Risk appetite directly affects what part of a vulnerability management program?

A.
Staff
A.
Staff
Answers
B.
Scope
B.
Scope
Answers
C.
Schedule
C.
Schedule
Answers
D.
Scan tools
D.
Scan tools
Answers
Suggested answer: B

When choosing a risk mitigation method what is the MOST important factor?

A.
Approval from the board of directors
A.
Approval from the board of directors
Answers
B.
Cost of the mitigation is less than the risk
B.
Cost of the mitigation is less than the risk
Answers
C.
Metrics of mitigation method success
C.
Metrics of mitigation method success
Answers
D.
Mitigation method complies with PCI regulations
D.
Mitigation method complies with PCI regulations
Answers
Suggested answer: B

Payment Card Industry (PCI) compliance requirements are based on what criteria?

A.
The types of cardholder data retained
A.
The types of cardholder data retained
Answers
B.
The duration card holder data is retained
B.
The duration card holder data is retained
Answers
C.
The size of the organization processing credit card data
C.
The size of the organization processing credit card data
Answers
D.
The number of transactions performed per year by an organization
D.
The number of transactions performed per year by an organization
Answers
Suggested answer: D

Which of the following provides an audit framework?

A.
Control Objectives for IT (COBIT)
A.
Control Objectives for IT (COBIT)
Answers
B.
Payment Card Industry-Data Security Standard (PCI-DSS)
B.
Payment Card Industry-Data Security Standard (PCI-DSS)
Answers
C.
International Organization Standard (ISO) 27002
C.
International Organization Standard (ISO) 27002
Answers
D.
National Institute of Standards and Technology (NIST) SP 800-30
D.
National Institute of Standards and Technology (NIST) SP 800-30
Answers
Suggested answer: A

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?

A.
Awareness
A.
Awareness
Answers
B.
Compliance
B.
Compliance
Answers
C.
Governance
C.
Governance
Answers
D.
Management
D.
Management
Answers
Suggested answer: C

Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?

A.
Reduction of budget
A.
Reduction of budget
Answers
B.
Decreased security awareness
B.
Decreased security awareness
Answers
C.
Improper use of information resources
C.
Improper use of information resources
Answers
D.
Fines for regulatory non-compliance
D.
Fines for regulatory non-compliance
Answers
Suggested answer: D

The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for

A.
Confidentiality, Integrity and Availability
A.
Confidentiality, Integrity and Availability
Answers
B.
Assurance, Compliance and Availability
B.
Assurance, Compliance and Availability
Answers
C.
International Compliance
C.
International Compliance
Answers
D.
Integrity and Availability
D.
Integrity and Availability
Answers
Suggested answer: A

When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it

A.
In promiscuous mode and only detect malicious traffic.
A.
In promiscuous mode and only detect malicious traffic.
Answers
B.
In-line and turn on blocking mode to stop malicious traffic.
B.
In-line and turn on blocking mode to stop malicious traffic.
Answers
C.
In promiscuous mode and block malicious traffic.
C.
In promiscuous mode and block malicious traffic.
Answers
D.
In-line and turn on alert mode to stop malicious traffic.
D.
In-line and turn on alert mode to stop malicious traffic.
Answers
Suggested answer: B
Total 460 questions
Go to page: of 46