Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 4

Questions 31

What is protected by Federal Information Processing Standards (FIPS) 140-2?

Options:
A.

Integrity

B.

Confidentiality

C.

Non-repudiation

D.

Availability

ECCouncil 712-50 Premium Access
Questions 32

What is a key goal of information security?

Options:
A.

Creation of controls and processes to security the organization's data and information resources

B.

The documentation and qualification of risk be the organization to facilitate better decision making by management

C.

The confidentiality, integrity, and availability of the organization s data and information resources

D.

to reduce adverse impacts on the organization to an acceptable level of risk

Questions 33

Which of the following is the MOST effective method to counter phishing attacks?

Options:
A.

User awareness and training

B.

Host based Intrusion Detection System (IPS)

C.

Acceptable use guide signed by all system users

D.

Antispam solution

Questions 34

What is a Statement of Objectives (SOA)?

Options:
A.

A section of a contract that defines tasks to be performed under said contract

B.

An outline of what the military will do during war

C.

A document that outlines specific desired outcomes as part of a request for proposal

D.

Business guidance provided by the CEO

Questions 35

Which of the following is considered the MOST effective tool against social engineering?

Options:
A.

Anti-phishing tools

B.

Effective Security awareness program

C.

Anti-malware tools

D.

Effective Security Vulnerability Management Program

Questions 36

You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.

Which control is MOST important to protect AI products?

Options:
A.

Hash datasets

B.

Sanitize datasets

C.

Delete datasets

D.

Encrypt datasets

Questions 37

What is the estimate of all direct and indirect costs associated with an asset or acquisition over its entire life cycle?

Options:
A.

Total COST of Product

B.

Total Cost of Ownership

C.

Return on Investment

D.

Total Cost of Production

Questions 38

Which of the following areas are beyond the duties of the CISO?

Options:
A.

IT security compliance

B.

lnformation Technology (IT) portfolio management

C.

Network monitoring

D.

Cybersecurity policy

Questions 39

A Security Operations Manager is finding it difficult to maintain adequate staff levels to monitor security operations during off-hours. To reduce the impact of staff shortages and increase coverage during off-hours, the SecOps manager is considering outsourcing off-hour coverage.

What Security Operations Center (SOC) model does this BEST describe?

Options:
A.

Virtual SOC

B.

In-house SOC

C.

Security Network Operations Center (SNOC)

D.

Hybrid SOC

Questions 40

Many successful cyber-attacks currently include:

Options:
A.

Phishing Attacks

B.

Misconfigurations

C.

All of these

D.

Social engineering