Pass the ECCouncil EISM 512-50 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions
Questions # 51:

An anonymity network is a series of?

Options:

A.

Covert government networks


B.

War driving maps


C.

Government networks in Tora


D.

Virtual network tunnels


Expert Solution
Questions # 52:

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.

It is an IPSec protocol.


B.

It is a text-based communication protocol.


C.

It uses TCP port 22 as the default port and operates at the application layer.


D.

It uses UDP port 22


Expert Solution
Questions # 53:

The process of identifying and classifying assets is typically included in the

Options:

A.

Threat analysis process


B.

Asset configuration management process


C.

Business Impact Analysis


D.

Disaster Recovery plan


Expert Solution
Questions # 54:

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Options:

A.

Trusted and untrusted networks


B.

Type of authentication


C.

Storage encryption


D.

Log retention


Expert Solution
Questions # 55:

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

Options:

A.

chain of custody.


B.

electronic discovery.


C.

evidence tampering.


D.

electronic review.


Expert Solution
Questions # 56:

Which of the following is a symmetric encryption algorithm?

Options:

A.

3DES


B.

MD5


C.

ECC


D.

RSA


Expert Solution
Questions # 57:

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

1.Covering tracks

2.Scanning and enumeration

3.Maintaining Access

4.Reconnaissance

5.Gaining Access

Options:

A.

4, 2, 5, 3, 1


B.

2, 5, 3, 1, 4


C.

4, 5, 2, 3, 1


D.

4, 3, 5, 2, 1


Expert Solution
Questions # 58:

Which of the following is the MAIN security concern for public cloud computing?

Options:

A.

Unable to control physical access to the servers


B.

Unable to track log on activity


C.

Unable to run anti-virus scans


D.

Unable to patch systems as needed


Expert Solution
Questions # 59:

The process of creating a system which divides documents based on their security level to manage access to private data is known as

Options:

A.

security coding


B.

data security system


C.

data classification


D.

privacy protection


Expert Solution
Questions # 60:

Which of the following is a countermeasure to prevent unauthorized database access from web applications?

Options:

A.

Session encryption


B.

Removing all stored procedures


C.

Input sanitization


D.

Library control


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions