Free 512-50 Exam Braindumps (page: 49)

Page 48 of 102

The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset.
What did the CISO do wrong? (choose the BEST answer):

  1. Failed to identify all stakeholders and their needs
  2. Deployed the encryption solution in an inadequate manner
  3. Used 1024 bit encryption when 256 bit would have sufficed
  4. Used hardware encryption instead of software encryption

Answer(s): A



When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

  1. Type of data contained in the process/system
  2. Type of connection/protocol used to transfer the data
  3. Type of encryption required for the data once it is at rest
  4. Type of computer the data is processed on

Answer(s): A



When selecting a security solution with reoccurring maintenance costs after the first year (choose the BEST answer):

  1. The CISO should cut other essential programs to ensure the new solution's continued use
  2. Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution's continued use
  3. Defer selection until the market improves and cash flow is positive
  4. Implement the solution and ask for the increased operating cost budget when it is time

Answer(s): B



Which of the following information may be found in table top exercises for incident response?

  1. Security budget augmentation
  2. Process improvements
  3. Real-time to remediate
  4. Security control selection

Answer(s): B






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts