New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 13

Questions 181

Your company has a “no right to privacy” notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):

Options:
A.

Grant her access, the employee has been adequately warned through the AUP.

B.

Assist her with the request, but only after her supervisor signs off on the action.

C.

Reset the employee’s password and give it to the supervisor.

D.

Deny the request citing national privacy laws.

ECCouncil 712-50 Premium Access
Questions 182

A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

Options:
A.

non-repudiation

B.

conflict resolution

C.

strong authentication

D.

digital rights management

Questions 183

The primary responsibility for assigning entitlements to a network share lies with which role?

Options:
A.

CISO

B.

Data owner

C.

Chief Information Officer (CIO)

D.

Security system administrator

Questions 184

You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.

Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?

Options:
A.

Scope of the project

B.

Training of the personnel on the project

C.

Timeline of the project milestones

D.

Vendor for the project

Questions 185

Human resource planning for security professionals in your organization is a:

Options:
A.

Simple and easy task because the threats are getting easier to find and correct.

B.

Training requirement that is met through once every year user training.

C.

Training requirement that is on-going and always changing.

D.

Not needed because automation and anti-virus software has eliminated the threats.

Questions 186

Which type of physical security control scan a person’s external features through a digital video camera before

granting access to a restricted area?

Options:
A.

Iris scan

B.

Retinal scan

C.

Facial recognition scan

D.

Signature kinetics scan

Questions 187

What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?

Options:
A.

Business Impact Analysis

B.

Economic Impact analysis

C.

Return on Investment

D.

Cost-benefit analysis

Questions 188

As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?

Options:
A.

Executive summary

B.

Penetration test agreement

C.

Names and phone numbers of those who conducted the audit

D.

Business charter

Questions 189

The ultimate goal of an IT security projects is:

Options:
A.

Increase stock value

B.

Complete security

C.

Support business requirements

D.

Implement information security policies

Questions 190

Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?

Options:
A.

To give information security management recommendations to those who are responsible for initiating, implementing, or maintaining security in their organization.

B.

To provide a common basis for developing organizational security standards

C.

To provide effective security management practice and to provide confidence in inter-organizational dealings

D.

To established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization

Questions 191

Which of the following has the PRIMARY responsibility for determining access rights requirements to information?

Options:
A.

Chief Information Officer (CIO)

B.

Data owner

C.

Database engineer

D.

Chief Information Security Officer (CISO)