New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 712-50 Practice Exam with Questions & Answers | Set: 9

Questions 121

Which International Organization for Standardization (ISO) below BEST describes the performance of risk management, and includes a five-stage risk management methodology.

Options:
A.

ISO 27001

B.

ISO 27002

C.

ISO 27004

D.

ISO 27005

ECCouncil 712-50 Premium Access
Questions 122

A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).

In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?

Options:
A.

Recovery Point Objective (RPO)

B.

Mean Time to Delivery (MTD)

C.

Recovery Time Objective (RTO)

D.

Maximum Tolerable Downtime (MTD)

Questions 123

The Information Security Management program MUST protect:

Options:
A.

all organizational assets

B.

critical business processes and /or revenue streams

C.

intellectual property released into the public domain

D.

against distributed denial of service attacks

Questions 124

The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?

Options:
A.

Provide developer security training

B.

Deploy Intrusion Detection Systems

C.

Provide security testing tools

D.

Implement Compensating Controls

Questions 125

What is the first thing that needs to be completed in order to create a security program for your organization?

Options:
A.

Risk assessment

B.

Security program budget

C.

Business continuity plan

D.

Compliance and regulatory analysis

Questions 126

What process evaluates technical and non-technical security controls to validate that an implementation meets a specific set of security requirements?

Options:
A.

System certification

B.

Policy accreditation

C.

Risk analysis

D.

Goals attainment

Questions 127

Which of the following is the MOST logical method of deploying security controls within an organization?

Options:
A.

Obtain funding for all desired controls and then create project plans for implementation

B.

Apply the simpler controls as quickly as possible and use a risk-based approach for the more difficult andcostly controls

C.

Apply the least costly controls to demonstrate positive program activity

D.

Obtain business unit buy-in through close communication and coordination

Questions 128

In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?

Options:
A.

High risk environments 6 months, low risk environments 12 months

B.

Every 12 months

C.

Every 18 months

D.

Every six months

Questions 129

When choosing a risk mitigation method what is the MOST important factor?

Options:
A.

Approval from the board of directors

B.

Cost of the mitigation is less than the risk

C.

Metrics of mitigation method success

D.

Mitigation method complies with PCI regulations

Questions 130

When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?

Options:
A.

How many credit card records are stored?

B.

How many servers do you have?

C.

What is the scope of the certification?

D.

What is the value of the assets at risk?

Questions 131

XYZ is a publicly-traded software development company.

Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?

Options:
A.

Chief Financial Officer (CFO)

B.

Chief Software Architect (CIO)

C.

CISO

D.

Chief Executive Officer (CEO)

Questions 132

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

Options:
A.

chain of custody.

B.

electronic discovery.

C.

evidence tampering.

D.

electronic review.

Questions 133

Which of the following is the MOST important for a CISO to understand when identifying threats?

Options:
A.

How vulnerabilities can potentially be exploited in systems that impact the organization

B.

How the security operations team will behave to reported incidents

C.

How the firewall and other security devices are configured to prevent attacks

D.

How the incident management team prepares to handle an attack

Questions 134

Of the following, what is the FIRST step when developing an information security program?

Options:
A.

Design

B.

Execute

C.

Deploy

D.

Assess

Questions 135

Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.

How can you reduce the administrative burden of distributing symmetric keys for your employer?

Options:
A.

Use asymmetric encryption for the automated distribution of the symmetric key

B.

Use a self-generated key on both ends to eliminate the need for distribution

C.

Use certificate authority to distribute private keys

D.

Symmetrically encrypt the key and then use asymmetric encryption to unencrypt it