EC COUNCIL 512 50
Q: 1
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
Options
Q: 2
The PRIMARY objective for information security program development should be:
Options
Q: 3
A method to transfer risk is to:
Options
Q: 4
When managing an Information Security Program, which of the following is of MOST importance in
order to influence the culture of an organization?
Options
Q: 5
Developing effective security controls is a balance between:
Options
Q: 6
A business unit within your organization intends to deploy a new technology in a manner that places
it in violation of existing information security standards. What immediate action should the
information security manager take?
Options
Q: 7
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial
information indicates the systems are under attack from an outside entity. As the Chief Information
Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the
details of this incident and take action according to the information available to the team.
What phase of the response provides measures to reduce the likelihood of an incident from
recurring?
Options
Q: 8
Scenario: An organization has made a decision to address Information Security formally and
consistently by adopting established best practices and industry standards. The organization is a
small retail merchant but it is expected to grow to a global customer base of many millions of
customers in just a few years.
Which of the following would be the FIRST step when addressing Information Security formally and
consistently in this organization?
Options
Q: 9
Scenario: Your company has many encrypted telecommunications links for their world-wide
operations. Physically distributing symmetric keys to all locations has proven to be administratively
burdensome, but symmetric keys are preferred to other alternatives.
Symmetric encryption in general is preferable to asymmetric encryption when:
Options
Q: 10
When dealing with Security Incident Response procedures, which of the following steps come FIRST
when reacting to an incident?
Options
Question 1 of 10