New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 7

Questions 91

Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?

Options:
A.

Purge

B.

Clear

C.

Mangle

D.

Destroy

ECCouncil 712-50 Premium Access
Questions 92

Who is responsible for securing networks during a security incident?

Options:
A.

Chief Information Security Officer (CISO)

B.

Security Operations Center (SO

C.

Disaster Recovery (DR) manager

D.

Incident Response Team (IRT)

Questions 93

The formal certification and accreditation process has four primary steps, what are they?

Options:
A.

Evaluating, describing, testing and authorizing

B.

Evaluating, purchasing, testing, authorizing

C.

Auditing, documenting, verifying, certifying

D.

Discovery, testing, authorizing, certifying

Questions 94

What is the name of a formal statement that defines the strategy, approach, or expectations related to specific concerns within an organization:

Options:
A.

Policy

B.

standard

C.

Procedure

D.

Guideline

Questions 95

You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:
A.

Qualitative analysis

B.

Quantitative analysis

C.

Risk mitigation

D.

Estimate activity duration

Questions 96

Which of the following defines the boundaries and scope of a risk assessment?

Options:
A.

The risk assessment schedule

B.

The risk assessment framework

C.

The risk assessment charter

D.

The assessment context

Questions 97

What is the MOST likely detrimental consequence arising from an ineffective security governance program within a highly regulated organization?

Options:
A.

Delayed response to security incidents

B.

Increased regulatory personnel allocation for security oversight

C.

Penalties incurred due to regulatory violations

D.

Increased employee morale and satisfaction

Questions 98

Regulatory requirements typically force organizations to implement

Options:
A.

Mandatory controls

B.

Discretionary controls

C.

Optional controls

D.

Financial controls

Questions 99

What type of control is used when assigning information assurance requirements to an independent security group?

Options:
A.

Detective

B.

Organizational

C.

Preemptive

D.

Proactive

Questions 100

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:
A.

type of computer the data s processed on

B.

Type of data contained in the process and system

C.

Type of connection and protocol used to transfer the data

D.

Type of encryption required for the data once it is at rest

Questions 101

What is the BEST approach for managing shared elements from multiple regulations and standards?

Options:
A.

Develop a compliance crosswalk to manage overlapping requirements

B.

Design your program to meet the strictest requirements from each statute

C.

Retain all compliance requirements in a central database

D.

Ensure the audit team is aware of their responsibility to communicate critical needs to the organization

Questions 102

Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?

Options:
A.

System testing

B.

Risk assessment

C.

Incident response

D.

Planning

Questions 103

What is the BEST way to achieve on-going compliance monitoring in an organization?

Options:
A.

Only check compliance right before the auditors are scheduled to arrive onsite.

B.

Outsource compliance to a 3rd party vendor and let them manage the program.

C.

Have Compliance and Information Security partner to correct issues as they arise.

D.

Have Compliance direct Information Security to fix issues after the auditors report.

Questions 104

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?

Options:
A.

Systems logs

B.

Hardware error reports

C.

Utilization reports

D.

Availability reports

Questions 105

Which of the following BEST describes revenue?

Options:
A.

The economic benefit derived by operating a business

B.

The sum value of all assets and cash flow into the business

C.

Non-operating financial liabilities minus expenses

D.

The future profit-making potential of an organization