[Free] 2019(Nov) EnsurePass ECCouncil 712-50 Dumps with VCE and PDF 41-50

Get Full Version of the Exam

Question No.41

If your organization operates under a model of quot;assumption of breachquot;, you should:

  1. Protect all information resource assets equally

  2. Establish active firewall monitoring protocols

  3. Purchase insurance for your compliance liability

  4. Focus your security efforts on high value assets

Correct Answer: C

Question No.42

What is the relationship between information protection and regulatory compliance?

  1. That all information in an organization must be protected equally.

  2. The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.

  3. That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.

  4. There is no relationship between the two.

Correct Answer: C

Question No.43

You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the

  1. Controlled mitigation effort

  2. Risk impact comparison

  3. Relative likelihood of event

  4. Comparative threat analysis

Correct Answer: C

Question No.44

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

  1. Audit and Legal

  2. Budget and Compliance

  3. Human Resources and Budget

  4. Legal and Human Resources

Correct Answer: A

Question No.45

When managing the security architecture for your company you must consider:

  1. Security and IT Staff size

  2. Company Values

  3. Budget

  4. All of the above

Correct Answer: D

Question No.46

The PRIMARY objective for information security program development should be:

  1. Reducing the impact of the risk to the business.

  2. Establishing strategic alignment with bunsiness continuity requirements

  3. Establishing incident response programs.

  4. Identifying and implementing the best security solutions.

Correct Answer: A

Question No.47

An organization#39;s Information Security Policy is of MOST importance because

  1. it communicates management#39;s commitment to protecting information resources

  2. it is formally acknowledged by all employees and vendors

  3. it defines a process to meet compliance requirements

  4. it establishes a framework to protect confidential information

Correct Answer: A

Question No.48

Which of the following intellectual Property components is focused on maintaining brand


  1. Trademark

  2. Patent

  3. Research Logs

  4. Copyright

Correct Answer: A

Question No.49

The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for

  1. Confidentiality, Integrity and Availability

  2. Assurance, Compliance and Availability

  3. International Compliance

  4. Integrity and Availability

Correct Answer: A

Question No.50

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

  1. Chief Information Security Officer

  2. Chief Executive Officer

  3. Chief Information Officer

  4. Chief Legal Counsel

Correct Answer: B

Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF