[Free] 2019(Nov) EnsurePass ECCouncil 712-50 Dumps with VCE and PDF 201-210

Get Full Version of the Exam

Question No.201

A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?

  1. The software license expiration is probably out of synchronization with other software licenses

  2. The project was initiated without an effort to get support from impacted business units in the organization

  3. The software is out of date and does not provide for a scalable solution across the enterprise

  4. The security officer should allow time for the organization to get accustomed to her presence before initiating security projects

Correct Answer: B

Question No.202

When managing the critical path of an IT security project, which of the following is MOST important?

  1. Knowing who all the stakeholders are.

  2. Knowing the people on the data center team.

  3. Knowing the threats to the organization.

  4. Knowing the milestones and timelines of deliverables.

Correct Answer: D

Question No.203

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?

  1. A security organization that is adequately staffed to apply required mitigation strategies and regulatory compliance solutions

  2. A clear set of security policies and procedures that are more concept-based than controls-based

  3. A complete inventory of Information Technology assets including infrastructure, networks, applications and data

  4. A clearly identified executive sponsor who will champion the effort to ensure organizational buy-in

Correct Answer: D

Question No.204

Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?

  1. User awareness training for all employees

  2. Installation of new firewalls and intrusion detection systems

  3. Launch an internal awareness campaign

  4. Integrate security requirements into project inception

Correct Answer: D

Question No.205

The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?

  1. The company lacks a risk management process

  2. The company does not believe the security vulnerabilities to be real

  3. The company has a high risk tolerance

  4. The company lacks the tools to perform a vulnerability assessment

Correct Answer: C

Question No.206

Which of the following is critical in creating a security program aligned with an organization#39;s goals?

  1. Ensure security budgets enable technical acquisition and resource allocation based on internal compliance requirements

  2. Develop a culture in which users, managers and IT professionals all make good decisions about

    information risk

  3. Provide clear communication of security program support requirements and audit schedules

  4. Create security awareness programs that include clear definition of security program goals and charters

Correct Answer: B

Question No.207

A stakeholder is a person or group:

  1. Vested in the success and/or failure of a project or initiative regardless of budget implications.

  2. Vested in the success and/or failure of a project or initiative and is tied to the project budget.

  3. That has budget authority.

  4. That will ultimately use the system.

Correct Answer: A

Question No.208

As the CISO for your company you are accountable for the protection of information resources commensurate with:

  1. Customer demand

  2. Cost and time to replace

  3. Insurability tables

  4. Risk of exposure

Correct Answer: D

Question No.209

In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?

  1. Vmware, router, switch, firewall, syslog, vulnerability management system (VMS)

  2. Intrusion Detection System (IDS), firewall, switch, syslog

  3. Security Incident Event Management (SIEM), IDS, router, syslog

  4. SIEM, IDS, firewall, VMS

Correct Answer: D

Question No.210

Which of the following is considered one of the most frequent failures in project management?

  1. Overly restrictive management

  2. Excessive personnel on project

  3. Failure to meet project deadlines

  4. Insufficient resources

Correct Answer: C

Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF