Free 512-50 Exam Braindumps (page: 25)

Page 24 of 102

Which of the following are the MOST important factors for proactively determining system vulnerabilities?

  1. Subscribe to vendor mailing list to get notification of system vulnerabilities
  2. Deploy Intrusion Detection System (IDS) and install anti-virus on systems
  3. Configure firewall, perimeter router and Intrusion Prevention System (IPS)
  4. Conduct security testing, vulnerability scanning, and penetration testing

Answer(s): D



What role should the CISO play in properly scoping a PCI environment?

  1. Validate the business units' suggestions as to what should be included in the scoping process
  2. Work with a Qualified Security Assessor (QSA) to determine the scope of the PCI environment
  3. Ensure internal scope validation is completed and that an assessment has been done to discover all credit card data
  4. Complete the self-assessment questionnaire and work with an Approved Scanning Vendor (ASV) to determine scope

Answer(s): C



What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?

  1. Test every three years to ensure that things work as planned
  2. Conduct periodic tabletop exercises to refine the BC plan
  3. Outsource the creation and execution of the BC plan to a third party vendor
  4. Conduct a Disaster Recovery (DR) exercise every year to test the plan

Answer(s): B



What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

  1. Determine appetite
  2. Evaluate risk avoidance criteria
  3. Perform a risk assessment
  4. Mitigate risk

Answer(s): D






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts