[Free] 2019(Nov) EnsurePass ECCouncil 712-50 Dumps with VCE and PDF 191-200

Get Full Version of the Exam
http://www.EnsurePass.com/712-50.html

Question No.191

Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?

  1. Security administrators

  2. Security mangers

  3. Security technicians

  4. Security analysts

Correct Answer: B

Question No.192

An example of professional unethical behavior is:

  1. Gaining access to an affiliated employee#39;s work email account as part of an officially sanctioned internal investigation

  2. Sharing copyrighted material with other members of a professional organization where all members have legitimate access to the material

  3. Copying documents from an employer#39;s server which you assert that you have an intellectual property claim to possess, but the company disputes

  4. Storing client lists and other sensitive corporate internal documents on a removable thumb drive

Correct Answer: C

Question No.193

The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?

  1. Work with the IT group and tell them to put IPS in-line and say it won#39;t cause any network impact

  2. Explain to the IT group that the IPS won#39;t cause any network impact because it will fail open

  3. Explain to the IT group that this is a business need and the IPS will fail open however, if there is a network failure the CISO will accept responsibility

  4. Explain to the IT group that the IPS will fail open once in-line however it will be deployed in

monitor mode for a set period of time to ensure that it doesn#39;t block any legitimate traffic

Correct Answer: D

Question No.194

Which of the following is the MOST important component of any change management process?

  1. Scheduling

  2. Back-out procedures

  3. Outage planning

  4. Management approval

Correct Answer: D

Question No.195

A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?

  1. Security alignment to business goals

  2. Regulatory compliance effectiveness

  3. Increased security program presence

  4. Proper organizational policy enforcement

Correct Answer: A

Question No.196

Which of the following is the BEST indicator of a successful project?

  1. it is completed on time or early as compared to the baseline project plan

  2. it meets most of the specifications as outlined in the approved project definition

  3. it comes in at or below the expenditures planned for in the baseline budget

  4. the deliverables are accepted by the key stakeholders

Correct Answer: D

Question No.197

In effort to save your company money which of the following methods of training results in the lowest cost for the organization?

  1. Distance learning/Web seminars

  2. Formal Class

  3. One-One Training

  4. Self-Study (noncomputerized)

Correct Answer: D

Question No.198

Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?

  1. System testing

  2. Risk assessment

  3. Incident response

  4. Planning

Correct Answer: A

Question No.199

Which of the following can the company implement in order to avoid this type of security issue in the future?

  1. Network based intrusion detection systems

  2. A security training program for developers

  3. A risk management process

  4. A audit management process

Correct Answer: B

Question No.200

A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?

  1. Lack of asset management processes

  2. Lack of change management processes

  3. Lack of hardening standards

  4. Lack of proper access controls

Correct Answer: B

Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF