New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 4

Questions 46

Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?

Options:
A.

Virtual

B.

Dedicated

C.

Fusion

D.

Command

ECCouncil 712-50 Premium Access
Questions 47

Which of the following is considered a project versus a managed process?

Options:
A.

monitoring external and internal environment during incident response

B.

ongoing risk assessments of routine operations

C.

continuous vulnerability assessment and vulnerability repair

D.

installation of a new firewall system

Questions 48

What does RACI stand for?

Options:
A.

Reasonable, Actionable, Controlled, and Implemented

B.

Responsible, Actors, Consult, and Instigate

C.

Responsible, Accountable, Consulted, and Informed

D.

Review, Act, Communicate, and Inform

Questions 49

The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:

Options:
A.

Safeguard Value

B.

Cost Benefit Analysis

C.

Single Loss Expectancy

D.

Life Cycle Loss Expectancy

Questions 50

The success of the Chief Information Security Officer is MOST dependent upon:

Options:
A.

favorable audit findings

B.

following the recommendations of consultants and contractors

C.

development of relationships with organization executives

D.

raising awareness of security issues with end users

Questions 51

The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.

Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?

Options:
A.

The project is over budget

B.

The project budget has reserves

C.

The project cost is in alignment with the budget

D.

The project is under budget

Questions 52

Which of the following areas are beyond the duties of the CISO?

Options:
A.

IT security compliance

B.

lnformation Technology (IT) portfolio management

C.

Network monitoring

D.

Cybersecurity policy

Questions 53

Which of the following results would have the MOST significant negative effect on an organization's external market image?

Options:
A.

Negative internal audit findings regarding security controls performance

B.

Regulatory non-compliance resulting in fines and legal proceedings

C.

Unmanaged security awareness guidelines

D.

Increased security budgets due to discovered threats and vulnerabilities

Questions 54

A digital signature addresses which of the following concerns?

Options:
A.

Message alteration

B.

Message copying

C.

Message theft

D.

Unauthorized reading

Questions 55

Which of the following is a PRIMARY task of a risk management function within the security program?

Options:
A.

Creating and communicating Key Performance Indicators

B.

Deciding the organization's risk appetite

C.

Coordinating schedules of risk assessments

D.

Creating and approving risk mitigation

Questions 56

Which of the following is a benefit of a risk-based approach to audit planning?

Options:
A.

Resources are allocated to the areas of the highest concern

B.

Scheduling may be performed months in advance

C.

Budgets are more likely to be met by the IT audit staff

D.

Staff will be exposed to a variety of technologies

Questions 57

You assess the corporate culture and determine there is a pervasive opinion that the security program limits business performance. What is the MOST effective approach to reshape corporate culture to adopt security as a norm?

Options:
A.

Cite corporate policy and collaborate with individuals to review audit reports

B.

Explain how other similar organizations have been compromised

C.

Understand the business and focus your efforts on enabling operations securely

D.

Communicate compliance requirements and financial penalties

Questions 58

An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:

Options:
A.

Inform senior management of the risk involved.

B.

Agree to work with the security officer on these shifts as a form of preventative control.

C.

Develop a computer assisted audit technique to detect instances of abuses of the arrangement.

D.

Review the system log for each of the late night shifts to determine whether any irregular actions occurred.

Questions 59

Physical security measures typically include which of the following types of controls?

Options:
A.

Physical, technical, operational

B.

Technical, strong password, operational

C.

Optional, biometric, physical

D.

Strong password, biometric, common access technology

Questions 60

An ineffective security control was identified during an audit. What is the next action that should happen?

Options:
A.

Establish Key Risk Indicators (KRIs)

B.

Perform another complete audit to verify the finding

C.

Escalate the issue to the helpdesk function

D.

Perform a risk assessment on the impacted system or process