New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 512-50 Practice Exam with Questions & Answers | Set: 9

Questions 81

When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?

Options:
A.

Daily

B.

Hourly

C.

Weekly

D.

Monthly

ECCouncil 512-50 Premium Access
Questions 82

When you develop your audit remediation plan what is the MOST important criteria?

Options:
A.

To remediate half of the findings before the next audit.

B.

To remediate all of the findings before the next audit.

C.

To validate that the cost of the remediation is less than the risk of the finding.

D.

To validate the remediation process with the auditor.

Questions 83

The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s

Options:
A.

Risk Management Program.

B.

Anti-Spam controls.

C.

Security Awareness Program.

D.

Identity and Access Management Program.

Questions 84

Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?

Options:
A.

Perform a vulnerability scan of the network

B.

External penetration testing by a qualified third party

C.

Internal Firewall ruleset reviews

D.

Implement network intrusion prevention systems

Questions 85

At which point should the identity access management team be notified of the termination of an employee?

Options:
A.

At the end of the day once the employee is off site

B.

During the monthly review cycle

C.

Immediately so the employee account(s) can be disabled

D.

Before an audit

Questions 86

To have accurate and effective information security policies how often should the CISO review the organization policies?

Options:
A.

Every 6 months

B.

Quarterly

C.

Before an audit

D.

At least once a year

Questions 87

A missing/ineffective security control is identified. Which of the following should be the NEXT step?

Options:
A.

Perform an audit to measure the control formally

B.

Escalate the issue to the IT organization

C.

Perform a risk assessment to measure risk

D.

Establish Key Risk Indicators

Questions 88

IT control objectives are useful to IT auditors as they provide the basis for understanding the:

Options:
A.

Desired results or purpose of implementing specific control procedures.

B.

The audit control checklist.

C.

Techniques for securing information.

D.

Security policy

Questions 89

An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?

Options:
A.

Determine the annual loss expectancy (ALE)

B.

Create a crisis management plan

C.

Create technology recovery plans

D.

Build a secondary hot site

Questions 90

Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?

Options:
A.

Meet regulatory compliance requirements

B.

Better understand the threats and vulnerabilities affecting the environment

C.

Better understand strengths and weaknesses of the program

D.

Meet legal requirements