New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 5

Questions 61

What is protected by Federal Information Processing Standards (FIPS) 140-2?

Options:
A.

Integrity

B.

Confidentiality

C.

Non-repudiation

D.

Availability

ECCouncil 712-50 Premium Access
Questions 62

Which of the following are the triple constraints of project management?

Options:
A.

Time, quality, and scope

B.

Cost, quality, and time

C.

Scope, time, and cost

D.

Quality, scope, and cost

Questions 63

Which of the following is the MOST effective approach to secure physical hardware?

Options:
A.

Configure hypervisors for maximum protection

B.

Centrally manage assets and controls

C.

Assign clusters of administrators

D.

Distribute management by location

Questions 64

Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.

What action should you take FIRST?

Options:
A.

Destroy the repository of stolen data

B.

Contact your local law enforcement agency

C.

Consult with other C-Level executives to develop an action plan

D.

Contract with a credit reporting company for paid monitoring services for affected customers

Questions 65

A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?

Options:
A.

Alignment with the business

B.

Effective use of existing technologies

C.

Leveraging existing implementations

D.

Proper budget management

Questions 66

Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.

Using the best business practices for project management, you determine that the project correctly aligns with the organization goals. What should be verified next?

Options:
A.

Scope

B.

Budget

C.

Resources

D.

Constraints

Questions 67

Many successful cyber-attacks currently include:

Options:
A.

Phishing Attacks

B.

Misconfigurations

C.

All of these

D.

Social engineering

Questions 68

An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).

The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?

Options:
A.

ISO 22318 Supply Chain Continuity

B.

ISO 27031 BCM Readiness

C.

ISO 22301 BCM Requirements

D.

ISO 22317 BIA

Questions 69

Which of the following is a benefit of information security governance?

Options:
A.

Questioning the trust in vendor relationships.

B.

Increasing the risk of decisions based on incomplete management information.

C.

Direct involvement of senior management in developing control processes

D.

Reduction of the potential for civil and legal liability

Questions 70

Which of the following best summarizes the primary goal of a security program?

Options:
A.

Provide security reporting to all levels of an organization

B.

Create effective security awareness to employees

C.

Manage risk within the organization

D.

Assure regulatory compliance

Questions 71

In which of the following examples would an organization be more willing to accept a risk instead of mitigating it?

Options:
A.

The risk tolerance within the organization is high

B.

The organization’s risk tolerance is low

C.

The organization primarily uses qualitative risk measurement

D.

The organization’s risk management program is mature

Questions 72

What is the BEST reason for having a formal request for proposal process?

Options:
A.

Creates a timeline for purchasing and budgeting

B.

Allows small companies to compete with larger companies

C.

Clearly identifies risks and benefits before funding is spent

D.

Informs suppliers a company is going to make a purchase

Questions 73

Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?

Options:
A.

Servers, routers, switches, modem

B.

Firewall, exchange, web server, intrusion detection system (IDS)

C.

Firewall, anti-virus console, IDS, syslog

D.

IDS, syslog, router, switches

Questions 74

The rate of change in technology increases the importance of:

Options:
A.

Outsourcing the IT functions.

B.

Understanding user requirements.

C.

Hiring personnel with leading edge skills.

D.

Implementing and enforcing good processes.

Questions 75

What enterprise architecture framework is business-centric and composed of eight phases?

Options:
A.

Global Regulations Security Architecture

B.

The Open Group Architecture Framework (TOGAF)

C.

Federated Enterprise Architecture

D.

Control Objectives for Information Technology (COBIT)