Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 13

Questions 121

Which of the following is a benefit of information security governance?

Options:
A.

Questioning the trust in vendor relationships.

B.

Increasing the risk of decisions based on incomplete management information.

C.

Direct involvement of senior management in developing control processes

D.

Reduction of the potential for civil and legal liability

ECCouncil 712-50 Premium Access
Questions 122

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?

Options:
A.

Awareness

B.

Compliance

C.

Governance

D.

Management

Questions 123

Who in the organization determines access to information?

Options:
A.

Legal department

B.

Compliance officer

C.

Data Owner

D.

Information security officer

Questions 124

Which of the following should be determined while defining risk management strategies?

Options:
A.

Organizational objectives and risk tolerance

B.

Risk assessment criteria

C.

IT architecture complexity

D.

Enterprise disaster recovery plans

Questions 125

Which of the following activities is the MAIN purpose of the risk assessment process?

Options:
A.

Creating an inventory of information assets

B.

Classifying and organizing information assets into meaningful groups

C.

Assigning value to each information asset

D.

Calculating the risks to which assets are exposed in their current setting

Questions 126

When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?

Options:
A.

Escalation

B.

Recovery

C.

Eradication

D.

Containment

Questions 127

Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?

Options:
A.

Meet regulatory compliance requirements

B.

Better understand the threats and vulnerabilities affecting the environment

C.

Better understand strengths and weaknesses of the program

D.

Meet legal requirements

Questions 128

Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?

Options:
A.

Need to comply with breach disclosure laws

B.

Need to transfer the risk associated with hosting PII data

C.

Need to better understand the risk associated with using PII data

D.

Fiduciary responsibility to safeguard credit card information

Questions 129

You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?

Options:
A.

Validate that security awareness program content includes information about the potential vulnerability

B.

Conduct a thorough risk assessment against the current implementation to determine system functions

C.

Determine program ownership to implement compensating controls

D.

Send a report to executive peers and business unit owners detailing your suspicions

Questions 130

The success of the Chief Information Security Officer is MOST dependent upon:

Options:
A.

favorable audit findings

B.

following the recommendations of consultants and contractors

C.

development of relationships with organization executives

D.

raising awareness of security issues with end users