Free 512-50 Exam Braindumps (page: 54)

Page 53 of 102

When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?

  1. Vendors uses their own laptop and logins with same admin credentials your security team uses
  2. Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses
  3. Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials
  4. Vendor uses their own laptop and logins using two factor authentication with their own unique credentials

Answer(s): C



When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?

  1. At the time the security services are being performed and the vendor needs access to the network
  2. Once the agreement has been signed and the security vendor states that they will need access to the network
  3. Once the vendor is on premise and before they perform security services
  4. Prior to signing the agreement and before any security services are being performed

Answer(s): D



When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization.
Which example below is the MOST creative way to maintain a strong security posture during these difficult times?

  1. Download open source security tools and deploy them on your production network
  2. Download trial versions of commercially available security tools and deploy on your production network
  3. Download open source security tools from a trusted site, test, and then deploy on production network
  4. Download security tools from a trusted source and deploy to production network

Answer(s): C



The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability.
What would be the BEST approach for the CISO to reassure the IT group?

  1. Work with the IT group and tell them to put IPS in-line and say it won't cause any network impact
  2. Explain to the IT group that the IPS won't cause any network impact because it will fail open
  3. Explain to the IT group that this is a business need and the IPS will fail open however, if there is a network failure the CISO will accept responsibility
  4. Explain to the IT group that the IPS will fail open once in-line however it will be deployed in monitor mode for a set period of time to ensure that it doesn't block any legitimate traffic

Answer(s): D






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Exam Discussions & Posts