Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 712-50 Practice Exam with Questions & Answers

Questions 1

Which of the following is a critical operational component of an Incident Response Program (IRP)?

Options:
A.

Weekly program budget reviews to ensure the percentage of program funding remains constant.

B.

Annual review of program charters, policies, procedures and organizational agreements.

C.

Daily monitoring of vulnerability advisories relating to your organization’s deployed technologies.

D.

Monthly program tests to ensure resource allocation is sufficient for supporting the needs of the organization

ECCouncil 712-50 Premium Access
Questions 2

How is an Annual Loss Expectancy (ALE) calculated?

Options:
A.

Single Loss Expectancy multiplied by the Annual Rate of Occurrence

B.

Total loss frequency multiplied by the total loss probability

C.

Replacement cost multiplied by the total loss expectancy

D.

Value of the asset multiplied by the lifecycle loss expectancy

Questions 3

A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?

Options:
A.

Enforce the existing security standards and do not allow the deployment of the new technology.

B.

Amend the standard to permit the deployment.

C.

If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.

D.

Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.

Questions 4

What is a critical initial step when creating a Business Continuity Plan (BCP)?

Options:
A.

Conduct a full risk assessment on all business operations and technologies

B.

Create multiple layers of process steps

C.

Conduct a Business Impact Analysis (BIA)

D.

Define accurate Recovery Point Objectives (RPOs) and regularly test them

Questions 5

A large number of accounts in a hardened system were suddenly compromised to an external party. Which of

the following is the MOST probable threat actor involved in this incident?

Options:
A.

Poorly configured firewalls

B.

Malware

C.

Advanced Persistent Threat (APT)

D.

An insider

Questions 6

Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?

Options:
A.

Incident response plan

B.

Business Continuity plan

C.

Disaster recovery plan

D.

Damage control plan

Questions 7

An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?

Options:
A.

The CISO

B.

Audit and Compliance

C.

The CFO

D.

The business owner

Questions 8

Security related breaches are assessed and contained through which of the following?

Options:
A.

The IT support team.

B.

A forensic analysis.

C.

Incident response

D.

Physical security team.

Questions 9

SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.

During initial investigation, the team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical aspect of the team’s activities?

Options:
A.

Regular communication of incident status to executives

B.

Eradication of malware and system restoration

C.

Determination of the attack source

D.

Preservation of information

Questions 10

The Health Insurance Portability and Accountability Act (HIPAA) requires an agreement between Cloud Service Providers (CCSP) and the covered entity. Based on HIPAA. which document must be completed between the covered entity and the CCSP?

Options:
A.

Business Associate Agreement (BAA]

B.

Memorandum of Understanding (MOU)

C.

Service Level Agreement (SLA)

D.

Interconnection Security Agreement (ISA)

Questions 11

The risk found after a control has been fully implemented is called:

Options:
A.

Residual Risk

B.

Total Risk

C.

Post implementation risk

D.

Transferred risk

Questions 12

From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:

Options:
A.

Has a direct correlation with the CISO’s budget

B.

Represents, in part, the savings generated by the proper acquisition and implementation of security controls

C.

Represents the sum of all capital expenditures

D.

Represents the percentage of earnings that could in part be used to finance future security controls

Questions 13

What is the PRIMARY difference between regulations and standards?

Options:
A.

Standards that aren’t followed are punishable by fines

B.

Standards will include regulations

C.

Regulations must be reviewed and approved by the business

D.

Regulations are made enforceable by the power provided by laws

Questions 14

Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?

Options:
A.

It allows executives to more effectively monitor IT implementation costs

B.

Implementation of it eases an organization’s auditing and compliance burden

C.

Information Security (IS) procedures often require augmentation with other standards

D.

It provides for a consistent and repeatable staffing model for technology organizations

Questions 15

When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?

Options:
A.

At the time the security services are being performed and the vendor needs access to the network

B.

Once the agreement has been signed and the security vendor states that they will need access to the network

C.

Once the vendor is on premise and before they perform security services

D.

Prior to signing the agreement and before any security services are being performed