Pass the ECCouncil EISM 512-50 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

Options:

A.

The need to change accounting periods on a regular basis.


B.

The requirement to post entries for a closed accounting period.


C.

The need to create and modify the chart of accounts and its allocations.


D.

The lack of policies and procedures for the proper segregation of duties.


Expert Solution
Questions # 72:

What is the FIRST step in developing the vulnerability management program?

Options:

A.

Baseline the Environment


B.

Maintain and Monitor


C.

Organization Vulnerability


D.

Define Policy


Expert Solution
Questions # 73:

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

Options:

A.

In-line hardware keyloggers don’t require physical access


B.

In-line hardware keyloggers don’t comply to industry regulations


C.

In-line hardware keyloggers are undetectable by software


D.

In-line hardware keyloggers are relatively inexpensive


Expert Solution
Questions # 74:

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

Options:

A.

Traffic Analysis


B.

Deep-Packet inspection


C.

Packet sampling


D.

Heuristic analysis


Expert Solution
Questions # 75:

The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?

Options:

A.

Well established and defined digital forensics process


B.

Establishing Enterprise-owned Botnets for preemptive attacks


C.

Be able to retaliate under the framework of Active Defense


D.

Collaboration with law enforcement


Expert Solution
Questions # 76:

You have implemented the new controls. What is the next step?

Options:

A.

Document the process for the stakeholders


B.

Monitor the effectiveness of the controls


C.

Update the audit findings report


D.

Perform a risk assessment


Expert Solution
Questions # 77:

Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?

Options:

A.

Use within an organization to formulate security requirements and objectives


B.

Implementation of business-enabling information security


C.

Use within an organization to ensure compliance with laws and regulations


D.

To enable organizations that adopt it to obtain certifications


Expert Solution
Questions # 78:

The patching and monitoring of systems on a consistent schedule is required by?

Options:

A.

Local privacy laws


B.

Industry best practices


C.

Risk Management frameworks


D.

Audit best practices


Expert Solution
Questions # 79:

Which represents PROPER separation of duties in the corporate environment?

Options:

A.

Information Security and Identity Access Management teams perform two distinct functions


B.

Developers and Network teams both have admin rights on servers


C.

Finance has access to Human Resources data


D.

Information Security and Network teams perform two distinct functions


Expert Solution
Questions # 80:

The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?

Options:

A.

Number of callers who report security issues.


B.

Number of callers who report a lack of customer service from the call center


C.

Number of successful social engineering attempts on the call center


D.

Number of callers who abandon the call before speaking with a representative


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions