New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 9

Questions 81

What is the BEST way to achieve on-going compliance monitoring in an organization?

Options:
A.

Only check compliance right before the auditors are scheduled to arrive onsite.

B.

Outsource compliance to a 3rd party vendor and let them manage the program.

C.

Have Compliance and Information Security partner to correct issues as they arise.

D.

Have Compliance direct Information Security to fix issues after the auditors report.

ECCouncil 712-50 Premium Access
Questions 82

The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?

Options:
A.

Risk metrics

B.

Management metrics

C.

Operational metrics

D.

Compliance metrics

Questions 83

As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?

Options:
A.

Executive summary

B.

Penetration test agreement

C.

Names and phone numbers of those who conducted the audit

D.

Business charter

Questions 84

The patching and monitoring of systems on a consistent schedule is required by?

Options:
A.

Local privacy laws

B.

Industry best practices

C.

Risk Management frameworks

D.

Audit best practices

Questions 85

Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?

Options:
A.

Configure logging on each access point

B.

Install a firewall software on each wireless access point.

C.

Provide IP and MAC address

D.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

Questions 86

Which of the following is a symmetric encryption algorithm?

Options:
A.

3DES

B.

MD5

C.

ECC

D.

RSA

Questions 87

Which of the following backup sites takes the longest recovery time?

Options:
A.

Cold site

B.

Hot site

C.

Warm site

D.

Mobile backup site

Questions 88

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

Options:
A.

In-line hardware keyloggers don’t require physical access

B.

In-line hardware keyloggers don’t comply to industry regulations

C.

In-line hardware keyloggers are undetectable by software

D.

In-line hardware keyloggers are relatively inexpensive

Questions 89

An anonymity network is a series of?

Options:
A.

Covert government networks

B.

War driving maps

C.

Government networks in Tora

D.

Virtual network tunnels

Questions 90

Security related breaches are assessed and contained through which of the following?

Options:
A.

The IT support team.

B.

A forensic analysis.

C.

Incident response

D.

Physical security team.