Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
Questions # 61:

While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?

Options:

A.

Enterprise Risk Assessment


B.

Disaster recovery strategic plan


C.

Business continuity plan


D.

Application mapping document


Expert Solution
Questions # 62:

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

Options:

A.

‘ o 1=1 - -


B.

/../../../../


C.

“DROPTABLE USERNAME”


D.

NOPS


Expert Solution
Questions # 63:

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

Options:

A.

chain of custody.


B.

electronic discovery.


C.

evidence tampering.


D.

electronic review.


Expert Solution
Questions # 64:

An anonymity network is a series of?

Options:

A.

Covert government networks


B.

War driving maps


C.

Government networks in Tora


D.

Virtual network tunnels


Expert Solution
Questions # 65:

Which wireless encryption technology makes use of temporal keys?

Options:

A.

Wireless Application Protocol (WAP)


B.

Wifi Protected Access version 2 (WPA2)


C.

Wireless Equivalence Protocol (WEP)


D.

Extensible Authentication Protocol (EAP)


Expert Solution
Questions # 66:

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

1.Covering tracks

2.Scanning and enumeration

3.Maintaining Access

4.Reconnaissance

5.Gaining Access

Options:

A.

4, 2, 5, 3, 1


B.

2, 5, 3, 1, 4


C.

4, 5, 2, 3, 1


D.

4, 3, 5, 2, 1


Expert Solution
Questions # 67:

What type of attack requires the least amount of technical equipment and has the highest success rate?

Options:

A.

War driving


B.

Operating system attacks


C.

Social engineering


D.

Shrink wrap attack


Expert Solution
Questions # 68:

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Options:

A.

Trusted and untrusted networks


B.

Type of authentication


C.

Storage encryption


D.

Log retention


Expert Solution
Questions # 69:

An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?

Options:

A.

Shared key


B.

Asynchronous


C.

Open


D.

None


Expert Solution
Questions # 70:

Which of the following backup sites takes the longest recovery time?

Options:

A.

Cold site


B.

Hot site


C.

Warm site


D.

Mobile backup site


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions