Free 512-50 Exam Braindumps (page: 22)

Page 21 of 102

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?

  1. The asset owner
  2. The asset manager
  3. The data custodian
  4. The project manager

Answer(s): A



Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

  1. Audit and Legal
  2. Budget and Compliance
  3. Human Resources and Budget
  4. Legal and Human Resources

Answer(s): A



Risk appetite directly affects what part of a vulnerability management program?

  1. Staff
  2. Scope
  3. Schedule
  4. Scan tools

Answer(s): B



When choosing a risk mitigation method what is the MOST important factor?

  1. Approval from the board of directors
  2. Cost of the mitigation is less than the risk
  3. Metrics of mitigation method success
  4. Mitigation method complies with PCI regulations

Answer(s): B






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts