Which of the following statements about Encapsulating Security Payload (ESP) is true?
A. It is an IPSec protocol
B. it is a text-based communication protocol
C. It uses UDP port 22
D. It uses TCP port 22 as the default port and operates at the application layer
What is the FIRST step in developing the vulnerability management program?
A. Baseline the Environment
B. Define policy
C. Maintain and Monitor
D. Organization Vulnerability
Which of the following is MOST useful when developing a business case for security initiatives?
A. Cost/benefit analysis
B. Budget forecasts
C. Vendor management
D. Request for proposals
The process of creating a system which divides documents based on their security level to manage access to private data is known as ____________________.
A. security coding
B. Privacy protection
C. data security system
D. data classification
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
A. "DROPTABLE USERNAME"
B. NOPS
C. /../../../../
D. `O 1=1 -
When analyzing and forecasting a capital expense budget what are not included?
A. Purchase of new mobile devices to improve operations
B. New datacenter to operate from
C. Network connectivity costs
D. Upgrade of mainframe
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
A. Establishing Enterprise-owned Botnets for preemptive attacks
B. Collaboration with law enforcement
C. Well established and defined and defined digital forensics process
D. Be able to retaliate under the framework of Active defense
What type of attack requires the least amount of technical equipment and has the highest success rate?
A. Social engineering
B. Shrink wrap attacks
C. Operating system attacks
D. War driving
In terms of supporting a forensic investigation, it is now imperative that managers, firstresponders, etc., accomplish the following actions to the computer under investigation:
A. Immediately place hard drive and other components in an anti-static bag
B. Secure the area and attempt to maintain power until investigators arrive
C. Secure the area and shut down the computer until investigators arrive
D. Secure the area
Which of the following provides an independent assessment of a vendor's internal security controls and overall posture?
A. ISO27000 accreditation
B. Alignment with business goals
C. PCI attestation of compliance
D. Financial statements
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 712-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.