EC-Council 712-50 Exam Practice Questions (P. 1)
- Full Access (467 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
- Aknowledge required to analyze each issue
- Binformation security metrics
- Clinkage to business area objectivesMost Voted
- Dbaseline against which metrics are evaluated
Correct Answer:
C
C
send
light_mode
delete
Question #2
Which of the following should be determined while defining risk management strategies?
- AOrganizational objectives and risk toleranceMost Voted
- BEnterprise disaster recovery plans
- CRisk assessment criteria
- DIT architecture complexity
Correct Answer:
A
A
send
light_mode
delete
Question #3
Which of the following is the MOST important benefit of an effective security governance process?
- ASenior management participation in the incident response process
- BBetter vendor management
- CReduction of security breaches
- DReduction of liability and overall risk to the organizationMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #4
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units.
Which of the following standards and guidelines can BEST address this organization's need?
Which of the following standards and guidelines can BEST address this organization's need?
- AInternational Organization for Standardizations ג€" 22301 (ISO-22301)
- BInformation Technology Infrastructure Library (ITIL)
- CPayment Card Industry Data Security Standards (PCI-DSS)
- DInternational Organization for Standardizations ג€" 27005 (ISO-27005)
Correct Answer:
A
A
send
light_mode
delete
Question #5
A security manager regularly checks work areas after business hours for security violations; such as unsecured files or unattended computers with active sessions.
This activity BEST demonstrates what part of a security program?
This activity BEST demonstrates what part of a security program?
- ACompliance managementMost Voted
- BAudit validation
- CPhysical control testing
- DSecurity awareness training
Correct Answer:
A
A
send
light_mode
delete
Question #6
Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?
- ANeed to comply with breach disclosure laws
- BFiduciary responsibility to safeguard credit information
- CNeed to transfer the risk associated with hosting PII data
- DNeed to better understand the risk associated with using PII data
Correct Answer:
D
D
send
light_mode
delete
Question #7
A method to transfer risk is to______________.
- AImplement redundancy
- BMove operations to another region
- CAlign to business operations
- DPurchase breach insurance
Correct Answer:
D
D
send
light_mode
delete
Question #8
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised.
What kind of law would require notifying the owner or licensee of this incident?
What kind of law would require notifying the owner or licensee of this incident?
- AConsumer right disclosure
- BData breach disclosure
- CSpecial circumstance disclosure
- DSecurity incident disclosure
Correct Answer:
B
B
send
light_mode
delete
Question #9
Why is it vitally important that senior management endorse a security policy?
- ASo that employees will follow the policy directives.Most Voted
- BSo that they can be held legally accountable.
- CSo that external bodies will recognize the organizations commitment to security.
- DSo that they will accept ownership for security within the organization.
Correct Answer:
D
D
send
light_mode
delete
Question #10
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
- AUnderstand the business goals of the organizationMost Voted
- BPoses a strong technical background
- CPoses a strong auditing background
- DUnderstand all regulations affecting the organization
Correct Answer:
A
A
send
light_mode
delete
All Pages