Get Full Version of the Exam
http://www.EnsurePass.com/712-50.html
Question No.1
After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of
-
Risk Tolerance
-
Qualitative risk analysis
-
Risk Appetite
-
Quantitative risk analysis
Correct Answer: D
Question No.2
An organization is looking for a framework to measure the efficiency and effectiveness of their Information Security Management System. Which of the following international standards can BEST assist this organization?
-
International Organization for Standardizations ?27004 (ISO-27004)
-
Payment Card Industry Data Security Standards (PCI-DSS)
-
Control Objectives for Information Technology (COBIT)
-
International Organization for Standardizations ?27005 (ISO-27005)
Correct Answer: A
Question No.3
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
-
How many credit card records are stored?
-
How many servers do you have?
-
What is the scope of the certification?
-
What is the value of the assets at risk?
Correct Answer: C
Question No.4
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
-
Providing a risk program governance structure
-
Ensuring developers include risk control comments in code
-
Creating risk assessment templates based on specific threats
-
Allowing for the acceptance of risk for regulatory compliance requirements
Correct Answer: A
Question No.5
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
-
Subscribe to vendor mailing list to get notification of system vulnerabilities
-
Deploy Intrusion Detection System (IDS) and install anti-virus on systems
-
Configure firewall, perimeter router and Intrusion Prevention System (IPS)
-
Conduct security testing, vulnerability scanning, and penetration testing
Correct Answer: D
Question No.6
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
-
Audit validation
-
Physical control testing
-
Compliance management
-
Security awareness training
Correct Answer: C
Question No.7
The PRIMARY objective of security awareness is to:
-
Ensure that security policies are read.
-
Encourage security-conscious employee behavior.
-
Meet legal and regulatory requirements.
-
Put employees on notice in case follow-up action for noncompliance is necessary
Correct Answer: B
Question No.8
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
-
Due Protection
-
Due Care
-
Due Compromise
-
Due process
Correct Answer: B
Question No.9
From an information security perspective, information that no longer supports the main purpose of the business should be:
-
assessed by a business impact analysis.
-
protected under the information classification policy.
-
analyzed under the data ownership policy.
-
analyzed under the retention policy
Correct Answer: D
Question No.10
Which of the following is considered the MOST effective tool against social engineering?
-
Anti-phishing tools
-
Anti-malware tools
-
Effective Security Vulnerability Management Program
-
Effective Security awareness program
Correct Answer: D
Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF