Free 512-50 Exam Braindumps (page: 51)

Page 50 of 102

Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed.
What can be done to ensure that security is addressed cost effectively?

  1. User awareness training for all employees
  2. Installation of new firewalls and intrusion detection systems
  3. Launch an internal awareness campaign
  4. Integrate security requirements into project inception

Answer(s): D



An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application.
Which of the following is MOST likely the reason for this recurring issue?

  1. Ineffective configuration management controls
  2. Lack of change management controls
  3. Lack of version/source controls
  4. High turnover in the application development department

Answer(s): C



Which of the following is the MOST important component of any change management process?

  1. Scheduling
  2. Back-out procedures
  3. Outage planning
  4. Management approval

Answer(s): D



Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?

  1. Terms and Conditions
  2. Service Level Agreements (SLA)
  3. Statement of Work
  4. Key Performance Indicators (KPI)

Answer(s): B






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts