New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 3

Questions 31

Creating a secondary authentication process for network access would be an example of?

Options:
A.

An administrator with too much time on their hands.

B.

Putting undue time commitment on the system administrator.

C.

Supporting the concept of layered security

D.

Network segmentation.

ECCouncil 712-50 Premium Access
Questions 32

An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.

What should the auditor’s NEXT step be?

Options:
A.

Immediately notify the board of directors of the organization as to the finding

B.

Correct the classifications immediately based on the auditor’s knowledge of the proper classification

C.

Document the missing classifications

D.

Identify the owner of the asset and induce the owner to apply a proper classification

Questions 33

When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?

Options:
A.

Configurations and software patch level

B.

Unallocated system storage and removable drives

C.

Persistent and volatile data

D.

Screen captures and keystroke logs

Questions 34

You have implemented a new security control. Which of the following risk strategy options have you engaged in?

Options:
A.

Risk Avoidance

B.

Risk Acceptance

C.

Risk Transfer

D.

Risk Mitigation

Questions 35

A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?

Options:
A.

Lack of a formal security awareness program

B.

Lack of a formal security policy governance process

C.

Lack of formal definition of roles and responsibilities

D.

Lack of a formal risk management policy

Questions 36

Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?

Options:
A.

Meet regulatory compliance requirements

B.

Better understand the threats and vulnerabilities affecting the environment

C.

Better understand strengths and weaknesses of the program

D.

Meet legal requirements

Questions 37

Simon had all his systems administrators implement hardware and software firewalls to ensure network

security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized

traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker

group was able to get into the network and modify files hosted on the company's website. After searching

through the firewall and server logs, no one could find how the attackers were able to get in. He decides that

the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts

administrators when a critical file is altered. What tool could Simon and his administrators implement to

accomplish this?

Options:
A.

They need to use Nessus.

B.

They can implement Wireshark.

C.

Snort is the best tool for their situation.

D.

They could use Tripwire.

Questions 38

Which of the following activities is the MAIN purpose of the risk assessment process?

Options:
A.

Creating an inventory of information assets

B.

Classifying and organizing information assets into meaningful groups

C.

Assigning value to each information asset

D.

Calculating the risks to which assets are exposed in their current setting

Questions 39

A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units. Which of the following standards and guidelines can BEST address this organization’s need?

Options:
A.

International Organization for Standardizations – 22301 (ISO-22301)

B.

Information Technology Infrastructure Library (ITIL)

C.

Payment Card Industry Data Security Standards (PCI-DSS)

D.

International Organization for Standardizations – 27005 (ISO-27005)

Questions 40

Most of your security projects are behind schedule and over budget, but they align with the security program goals and are correctly scoped. What should you do next?

Options:
A.

Obtain new project budgets

B.

Analyze resource availability

C.

Remove constraints

D.

Rewrite deliverable schedules

Questions 41

What function in an organization is responsible for collecting and communicating processes to facilitate the recovery of critical functions within an organization?

Options:
A.

Business Continuity

B.

Disaster Recovery

C.

Security Operations

D.

Legal Advisement

Questions 42

Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?

Options:
A.

Control Objective for Information Technology (COBIT)

B.

Committee of Sponsoring Organizations (COSO)

C.

Payment Card Industry (PCI)

D.

Information Technology Infrastructure Library (ITIL)

Questions 43

What is the next step after defining the conditions under which standard security controls must be applied?

Options:
A.

Perform an asset inventory and apply classifications

B.

Analyze future security control plans

C.

Adopt a culture of risk awareness

D.

Create risk mitigation plans

Questions 44

Which of the following is the MOST effective method for discovering common technical vulnerabilities within the

IT environment?

Options:
A.

Reviewing system administrator logs

B.

Auditing configuration templates

C.

Checking vendor product releases

D.

Performing system scans

Questions 45

What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

Options:
A.

Only IDS is susceptible to false positives

B.

An IPS examines network traffic flows to detect and actively stop exploits and attacks

C.

IPS identify potentially malicious traffic based on signature or behavior and IDS does not

D.

IDS are typically deployed behind the firewall and IPS are deployed in front of the firewall