Free 512-50 Exam Braindumps (page: 41)

Page 40 of 102

Which of the following are necessary to formulate responses to external audit findings?

  1. Internal Audit, Management, and Technical Staff
  2. Internal Audit, Budget Authority, Management
  3. Technical Staff, Budget Authority, Management
  4. Technical Staff, Internal Audit, Budget Authority

Answer(s): C



The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees.
Which of the following can be used as a KPI?

  1. Number of callers who report security issues.
  2. Number of callers who report a lack of customer service from the call center
  3. Number of successful social engineering attempts on the call center
  4. Number of callers who abandon the call before speaking with a representative

Answer(s): C



Creating a secondary authentication process for network access would be an example of?

  1. Nonlinearities in physical security performance metrics
  2. Defense in depth cost enumerated costs
  3. System hardening and patching requirements
  4. Anti-virus for mobile devices

Answer(s): A



Which of the following activities is the MAIN purpose of the risk assessment process?

  1. Creating an inventory of information assets
  2. Classifying and organizing information assets into meaningful groups
  3. Assigning value to each information asset
  4. Calculating the risks to which assets are exposed in their current setting

Answer(s): D






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts