New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 2

Questions 16

What is the last step in the system authorization process?

Options:
A.

Connecting the systems to an Internet Service Provider (ISP) for verification

B.

Getting authority to operate the system from executive management

C.

Changing the default passwords within all affected systems

D.

Conducting a final scan of the production system and mitigating all high-level vulnerabilities

ECCouncil 712-50 Premium Access
Questions 17

An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?

Options:
A.

Data breach disclosure

B.

Consumer right disclosure

C.

Security incident disclosure

D.

Special circumstance disclosure

Questions 18

Which of the following information may be found in table top exercises for incident response?

Options:
A.

Security budget augmentation

B.

Process improvements

C.

Real-time to remediate

D.

Security control selection

Questions 19

If the result of an NPV is positive, then the project should be selected. The net present value shows the present

value of the project, based on the decisions taken for its selection. What is the net present value equal to?

Options:
A.

Net profit – per capita income

B.

Total investment – Discounted cash

C.

Average profit – Annual investment

D.

Initial investment – Future value

Questions 20

What is the estimate of all direct and indirect costs associated with an asset or acquisition over its entire life cycle?

Options:
A.

Total COST of Product

B.

Total Cost of Ownership

C.

Return on Investment

D.

Total Cost of Production

Questions 21

Which of the following is the MOST important result of a business-aligned security program?

Options:
A.

Employees provide input to security policies

B.

Employees are encouraged to make good risk decisions

C.

Security training is entertaining

D.

Clear communication of audit schedules

Questions 22

Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:

Options:
A.

Create timelines for mitigation

B.

Develop a cost-benefit analysis

C.

Calculate annual loss expectancy

D.

Create a detailed technical executive summary

Questions 23

Risk transference is BEST represented by which of the following actions?

Options:
A.

Communicating the risk to all business units

B.

Outsourcing data storage operations to a third party

C.

Procuring cyber insurance

D.

Changing current processes for data retention

Questions 24

Why is it crucial to engage legal assistance when acquiring new products and services?

Options:
A.

To streamline the procurement process

B.

To ensure adherence to regulations and procurement requirements

C.

To reduce procurement costs

D.

To promote technical innovation

Questions 25

As the CISO, you have been tasked with the execution of the company’s key management program. You

MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key

control will ensure no single individual can constitute or re-constitute a key?

Options:
A.

Dual Control

B.

Separation of Duties

C.

Split Knowledge

D.

Least Privilege

Questions 26

What is one key difference between Capital expenditures and Operating expenditures?

Options:
A.

Operating expense cannot be written off while Capital expense can

B.

Operating expenses can be depreciated over time and Capital expenses cannot

C.

Capital expenses cannot include salaries and Operating expenses can

D.

Capital expenditures allow for the cost to be depreciated over time and Operating does not

Questions 27

In defining a strategic security plan for an organization, what should a CISO first analyze?

Options:
A.

Reach out to a business similar to yours and ask for their plan

B.

Set goals that are difficult to attain to drive more productivity

C.

Review business acquisitions for the past 3 years

D.

Analyze the broader organizational strategic plan

Questions 28

How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?

Options:
A.

Quarterly

B.

Semi-annually

C.

Bi-annually

D.

Annually

Questions 29

File Integrity Monitoring (FIM) is considered a

Options:
A.

Network based security preventative control

B.

Software segmentation control

C.

Security detective control

D.

User segmentation control

Questions 30

As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?

Options:
A.

The existing IT environment.

B.

The company business plan.

C.

The present IT budget.

D.

Other corporate technology trends.