Go Back on 712-50 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

712-50 Practice Test


Page 8 out of 89 Pages

Topic 1: Governance (Policy, Legal & Compliance)

Why is it vitally important that senior management endorse a security policy?


A.

So that they will accept ownership for security within the organization


B.

So that employees will follow the policy directives.


C.

So that external bodies will recognize the organizations commitment to security.


D.

So that they can be held legally accountable.





A.
  

So that they will accept ownership for security within the organization



The exposure factor of a threat to your organization is defined by?


A.

Asset value times exposure factor


B.

Annual rate of occurrence


C.

Annual loss expectancy minus current cost of controls


D.

Percentage of loss experienced due to a realized threat event





D.
  

Percentage of loss experienced due to a realized threat event



A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?


A.

Lack of a formal security awareness program


B.

Lack of a formal security policy governance process


C.

Lack of formal definition of roles and responsibilities


D.

Lack of a formal risk management policy





B.
  

Lack of a formal security policy governance process



Credit card information, medical data, and government records are all examples of:


A.

Confidential/Protected Information


B.

Bodily Information


C.

Territorial Information


D.

Communications Information





A.
  

Confidential/Protected Information



Which of the following is considered the MOST effective tool against social engineering?


A.

Anti-phishing tools


B.

Anti-malware tools


C.

Effective Security Vulnerability Management Program


D.

Effective Security awareness program





D.
  

Effective Security awareness program




Page 8 out of 89 Pages
Previous