New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 11

Questions 151

What is the main purpose of the Incident Response Team?

Options:
A.

Ensure efficient recovery and reinstate repaired systems

B.

Create effective policies detailing program activities

C.

Communicate details of information security incidents

D.

Provide current employee awareness programs

ECCouncil 712-50 Premium Access
Questions 152

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

Options:
A.

In-line hardware keyloggers don’t require physical access

B.

In-line hardware keyloggers don’t comply to industry regulations

C.

In-line hardware keyloggers are undetectable by software

D.

In-line hardware keyloggers are relatively inexpensive

Questions 153

What standard would you use to help define key performance indicators (KPIs)?

Options:
A.

ITIL

B.

GDPR

C.

ISO 31000

D.

NIST SP 800-55

Questions 154

When you develop your audit remediation plan what is the MOST important criteria?

Options:
A.

To remediate half of the findings before the next audit.

B.

To remediate all of the findings before the next audit.

C.

To validate that the cost of the remediation is less than the risk of the finding.

D.

To validate the remediation process with the auditor.

Questions 155

Which type of scan is used on the eye to measure the layer of blood vessels?

Options:
A.

Facial recognition scan

B.

Iris scan

C.

Signature kinetics scan

D.

Retinal scan

Questions 156

Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:

Options:
A.

Risk management

B.

Security management

C.

Mitigation management

D.

Compliance management

Questions 157

Which of the following controls is MOST critical for protecting Artificial Intelligence (AI) systems?

Options:
A.

Public cloud

B.

Encrypted computer storage

C.

Hashed datasets

D.

Sanitized datasets

Questions 158

A Security Operations Center (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen, and the database server was disconnected. Who must be informed of this incident?

Options:
A.

Internal audit

B.

All management staff

C.

Government regulators

D.

The data owner

Questions 159

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

Which of the following frameworks and standards will BEST fit the organization as a baseline for their security program?

Options:
A.

NIST and Privacy Regulations

B.

ISO 27000 and Payment Card Industry Data Security Standards

C.

NIST and data breach notification laws

D.

ISO 27000 and Human resources best practices

Questions 160

An organization correctly configured a Data Loss Prevention (DLP) technology. Afterward, sensitive data was found on public websites. What is the MOST likely reason for this situation?

Options:
A.

A risk assessment was performed on the technology

B.

The technology was not integrated with antivirus

C.

Data classification was not properly applied

D.

Sensitive data was not encrypted while at rest

Questions 161

Which of the following is a common technology for visual monitoring?

Options:
A.

Closed circuit television

B.

Open circuit television

C.

Blocked video

D.

Local video

Questions 162

A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?

Options:
A.

Compliance to the Payment Card Industry (PCI) regulations.

B.

Alignment with financial reporting regulations for each country where they operate.

C.

Alignment with International Organization for Standardization (ISO) standards.

D.

Compliance with patient data protection regulations for each country where they operate.

Questions 163

What is the difference between a quantitative and qualitative risk assessment?

Options:
A.

Qualitative risk assessments use mathematical formulas and precise data

B.

Quantitative risk assessments result in exact numbers

C.

Quantitative risk assessments result in ratings such as high, medium, and low

D.

Quantitative risk assessments never align directly to business objectives

Questions 164

You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?

Options:
A.

Validate that security awareness program content includes information about the potential vulnerability

B.

Conduct a thorough risk assessment against the current implementation to determine system functions

C.

Determine program ownership to implement compensating controls

D.

Send a report to executive peers and business unit owners detailing your suspicions

Questions 165

Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.

An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:

Options:
A.

Controlled spear phishing campaigns

B.

Password changes

C.

Baselining of computer systems

D.

Scanning for viruses