New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 12

Questions 166

The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?

Options:
A.

The asset is more expensive than the remediation

B.

The audit finding is incorrect

C.

The asset being protected is less valuable than the remediation costs

D.

The remediation costs are irrelevant; it must be implemented regardless of cost.

ECCouncil 712-50 Premium Access
Questions 167

Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?

Options:
A.

Single Loss Expectancy (SLE)

B.

Exposure Factor (EF)

C.

Annualized Rate of Occurrence (ARO)

D.

Temporal Probability (TP)

Questions 168

Which of the following is a countermeasure to prevent unauthorized database access from Web applications?

Options:
A.

Session encryption

B.

Library control

C.

Input sanitization

D.

Removal of stored procedures

Questions 169

Which of the following is MOST useful when developing a business case for security initiatives?

Options:
A.

Budget forecasts

B.

Request for proposals

C.

Cost/benefit analysis

D.

Vendor management

Questions 170

Which of the following provides the BEST software risk remediation methods?

Options:
A.

Software removal, define requirements, install updates

B.

Discover software, deploy integrations, apply updates

C.

Install patches and updates, adjust configurations, remove software

D.

Install software replacements, remove data, maintain system

Questions 171

A company wants to fill a Chief Information Security Officer position. Which of the following qualifications and experience would be MOST desirable in a candidate?

Options:
A.

Multiple certifications, strong technical capabilities and lengthy resume

B.

Industry certifications, technical knowledge and program management skills

C.

College degree, audit capabilities and complex project management

D.

Multiple references, strong background check and industry certifications

Questions 172

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?

Options:
A.

Awareness

B.

Compliance

C.

Governance

D.

Management

Questions 173

The PRIMARY objective of security awareness is to:

Options:
A.

Ensure that security policies are read.

B.

Encourage security-conscious employee behavior.

C.

Meet legal and regulatory requirements.

D.

Put employees on notice in case follow-up action for noncompliance is necessary

Questions 174

Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?

Options:
A.

Asset classification

B.

Security regulations

C.

Information security policy

D.

Data classification

Questions 175

What are the four groups that are critical to the success of evaluating and approving contracts during the negotiation phase?

Options:
A.

Legal, Finance, executives, users

B.

Legal, security, executives, users

C.

Security, executives, users, operations

D.

Security, users, legal, marketing

Questions 176

Which publication serves as a resource of enterprise security-based standards and BEST practices?

Options:
A.

NIS Standard Publication 800-53 R5

B.

HIPAA

C.

ISO 27004

D.

PCI DSS

Questions 177

If a Virtual Machine’s (VM) data is being replicated and that data is corrupted, this corruption will automatically

be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?

Options:
A.

Backup to tape

B.

Maintain separate VM backups

C.

Backup to a remote location

D.

Increase VM replication frequency

Questions 178

A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.

What is the MAIN goal of threat hunting to the SecOps Manager?

Options:
A.

Improve discovery of valid detected events

B.

Enhance tuning of automated tools to detect and prevent attacks

C.

Replace existing threat detection strategies

D.

Validate patterns of behavior related to an attack

Questions 179

Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.

The CISO has been able to implement a number of technical controls and is able to influence the Information Technology teams but has not been able to influence the rest of the organization. From an organizational perspective, which of the following is the LIKELY reason for this?

Options:
A.

The CISO does not report directly to the CEO of the organization

B.

The CISO reports to the IT organization

C.

The CISO has not implemented a policy management framework

D.

The CISO has not implemented a security awareness program

Questions 180

As a new CISO at a large healthcare company you are told that everyone has to badge in to get in the building. Below your office window you notice a door that is normally propped open during the day for groups of people to take breaks outside. Upon looking closer you see there is no badge reader. What should you do?

Options:
A.

Nothing, this falls outside your area of influence.

B.

Close and chain the door shut and send a company-wide memo banning the practice.

C.

Have a risk assessment performed.

D.

Post a guard at the door to maintain physical security