New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 10

Questions 136

What does the acronym RACI stand for?

Options:
A.

Review, Act, Communicate, and Inform

B.

Responsible, Accountable, Consulted, and Informed

C.

Responsible, Authorized, Consulted, and Initiated

D.

Researched, Advised, Communicated, and Implemented

ECCouncil 712-50 Premium Access
Questions 137

To reduce the threat of spear phishing, which of the following is the MOST critical security control to implement?

Options:
A.

Security awareness and training

B.

Firewall

C.

Data loss prevention

D.

Antivirus

Questions 138

When creating contractual agreements and procurement processes why should security requirements be included?

Options:
A.

To make sure they are added on after the process is completed

B.

To make sure the costs of security is included and understood

C.

To make sure the security process aligns with the vendor’s security process

D.

To make sure the patching process is included with the costs

Questions 139

Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?

Options:
A.

Senior Executives

B.

Office of the Auditor

C.

Office of the General Counsel

D.

All employees and users

Questions 140

What two methods are used to assess risk impact?

Options:
A.

Cost and annual rate of expectance

B.

Subjective and Objective

C.

Qualitative and percent of loss realized

D.

Quantitative and qualitative

Questions 141

What are the primary reasons for the development of a business case for a security project?

Options:
A.

To estimate risk and negate liability to the company

B.

To understand the attack vectors and attack sources

C.

To communicate risk and forecast resource needs

D.

To forecast usage and cost per software licensing

Questions 142

A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program. Which of the following qualifications and experience would be MOST desirable to find in a candidate?

Options:
A.

Multiple certifications, strong technical capabilities and lengthy resume

B.

Industry certifications, technical knowledge and program management skills

C.

College degree, audit capabilities and complex project management

D.

Multiple references, strong background check and industry certifications

Questions 143

What are the three hierarchically related aspects of strategic planning and in which order should they be done?

Options:
A.

1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity orinformation security strategic planning

B.

1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Informationtechnology strategic planning

C.

1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity orinformation security strategic planning

D.

1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Informationtechnology strategic planning

Questions 144

What is an example of a key performance indicator for cybersecurity?

Options:
A.

Percentage of product defects that negatively impact the security posture of the system

B.

Year over year comparison of organizational cybersecurity incidents

C.

Mean the to repair (MTTR)

D.

NetFlow data

Questions 145

Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?

Options:
A.

Alignment with business goals

B.

ISO27000 accreditation

C.

PCI attestation of compliance

D.

Financial statements

Questions 146

You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.

Which of the following is NOT documented in the SSP?

Options:
A.

The controls in place to secure the system

B.

Name of the connected system

C.

The results of a third-party audits and recommendations

D.

Type of information used in the system

Questions 147

You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the

Options:
A.

Controlled mitigation effort

B.

Risk impact comparison

C.

Relative likelihood of event

D.

Comparative threat analysis

Questions 148

Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?

Options:
A.

Cost benefit

B.

Risk appetite

C.

Business continuity

D.

Likelihood of impact

Questions 149

Acceptable levels of information security risk tolerance in an organization should be determined by?

Options:
A.

Corporate legal counsel

B.

CISO with reference to the company goals

C.

CEO and board of director

D.

Corporate compliance committee

Questions 150

Which is the single MOST important factor for introducing digital evidence into a court of law?

Options:
A.

Uninterrupted chain of custody

B.

Comprehensive logs from all servers and network devices

C.

Fully trained network experts to analyze systems

D.

Expert security operations witnesses