Free 712-50 Exam Braindumps (page: 15)

Page 15 of 115

What is the definition of Risk in Information Security?

  1. Risk = Probability x Impact
  2. Risk = Impact x Threat
  3. Risk = Threat x Probability
  4. Risk = Financial Impact x Probability

Answer(s): A



A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards.

What immediate action should the information security manager take?

  1. Enforce the existing security standards and do not allow the deployment of the new technology.
  2. If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.
  3. Amend the standard to permit the deployment.
  4. Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.

Answer(s): B



The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:

  1. Getting authority to operate the system from executive management
  2. Contacting the Internet Service Provider for an IP scope
  3. Changing the default passwords
  4. Conducting a final scan of the live system and mitigating all high and medium level vulnerabilities

Answer(s): A



An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitivedata breaches but the decision is made to purchase. What does this selection indicate?

  1. A high threat environment
  2. A low vulnerability environment
  3. A high risk tolerance environment
  4. A low risk tolerance environment

Answer(s): C






Post your Comments and Discuss EC-Council 712-50 exam with other Community members:

712-50 Exam Discussions & Posts