Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 3

Questions 21

An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.

What should the auditor’s NEXT step be?

Options:
A.

Immediately notify the board of directors of the organization as to the finding

B.

Correct the classifications immediately based on the auditor’s knowledge of the proper classification

C.

Document the missing classifications

D.

Identify the owner of the asset and induce the owner to apply a proper classification

ECCouncil 712-50 Premium Access
Questions 22

When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?

Options:
A.

SaaS provider’s website certifications and representations (certs and reps)

B.

SOC-2 Report

C.

Metasploit Audit Report

D.

Statement from SaaS provider attesting their ability to secure your data

Questions 23

What is a key policy that should be part of the information security plan?

Options:
A.

Account management policy

B.

Training policy

C.

Acceptable Use policy

D.

Remote Access policy

Questions 24

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:
A.

type of computer the data s processed on

B.

Type of data contained in the process and system

C.

Type of connection and protocol used to transfer the data

D.

Type of encryption required for the data once it is at rest

Questions 25

ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.

Which metric would meet the requirement?

Options:
A.

Number of times third parties access critical information systems

B.

Number of systems with known vulnerabilities

C.

Number of users with elevated privileges

D.

Number of websites with weak or misconfigured certificates

Questions 26

A CISO must conduct risk assessments using a method where the Chief Financial Officer (CFO) receives impact data in financial terms to use as input to select the proper level of coverage in a new cybersecurity insurance policy.

What is the MOST effective method of risk analysis to provide the CFO with the information required?

Options:
A.

Conduct a quantitative risk assessment

B.

Conduct a hybrid risk assessment

C.

Conduct a subjective risk assessment

D.

Conduct a qualitative risk assessment

Questions 27

As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.

The performance quality audit activity is done in what project management process group?

Options:
A.

Executing

B.

Controlling

C.

Planning

D.

Closing

Questions 28

What standard provides a comprehensive framework for information security risk management within organizations?

Options:
A.

Informal ion Technology Library (ITIL )

B.

Information Security Management System (ISMS!

C.

NIST 800-218

D.

International Standards Organization (ISO) 27005

Questions 29

Which of the following statements below regarding Key Performance indicators (KPIs) are true?

Options:
A.

Development of KPI’s are most useful when done independently

B.

They are a strictly quantitative measure of success

C.

They should be standard throughout the organization versus domain-specific so they are more easily correlated

D.

They are a strictly qualitative measure of success

Questions 30

Which security technologies are MOST critical to implementing a zero trust model?

Options:
A.

Firewalls, IPS, WAF

B.

DLP, SIFM, IP5

C.

ACLs, secure gateways, IPS

D.

MFA, IAM, Endpoint Security