Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 9

Questions 81

One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?

Options:
A.

Your public key

B.

The recipient's private key

C.

The recipient's public key

D.

Certificate authority key

ECCouncil 712-50 Premium Access
Questions 82

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Options:
A.

Trusted and untrusted networks

B.

Type of authentication

C.

Storage encryption

D.

Log retention

Questions 83

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:
A.

It is an IPSec protocol.

B.

It is a text-based communication protocol.

C.

It uses TCP port 22 as the default port and operates at the application layer.

D.

It uses UDP port 22

Questions 84

The process of identifying and classifying assets is typically included in the

Options:
A.

Threat analysis process

B.

Asset configuration management process

C.

Business Impact Analysis

D.

Disaster Recovery plan

Questions 85

Which of the following is a countermeasure to prevent unauthorized database access from web applications?

Options:
A.

Session encryption

B.

Removing all stored procedures

C.

Input sanitization

D.

Library control

Questions 86

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

Options:
A.

Secure the area and shut-down the computer until investigators arrive

B.

Secure the area and attempt to maintain power until investigators arrive

C.

Immediately place hard drive and other components in an anti-static bag

D.

Secure the area.

Questions 87

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

Options:
A.

‘ o 1=1 - -

B.

/../../../../

C.

“DROPTABLE USERNAME”

D.

NOPS

Questions 88

Which of the following backup sites takes the longest recovery time?

Options:
A.

Cold site

B.

Hot site

C.

Warm site

D.

Mobile backup site

Questions 89

Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?

Options:
A.

Allow the business units to decide which controls apply to their systems, such as the encryption of sensitive data

B.

Create separate controls for the business units based on the types of business and functions they perform

C.

Ensure business units are involved in the creation of controls and defining conditions under which they must be applied

D.

Provide the business units with control mandates and schedules of audits for compliance validation

Questions 90

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:
A.

Type of data contained in the process/system

B.

Type of connection/protocol used to transfer the data

C.

Type of encryption required for the data once it is at rest

D.

Type of computer the data is processed on