The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling.
What is the most likely reason for such broad access?
A. The need to change accounting periods on a regular basis.
B. The need to create and modify the chart of accounts and its allocations.
C. The requirement to post entries for closed accounting period.
D. The lack of policies and procedures for the proper segregation of duties.
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order. 1.Covering tracks 2.Scanning and enumeration 3.Maintaining Access 4.Reconnaissance 5.Gaining Access
A. 4, 3, 5, 2, 1
B. 4, 2, 5, 3, 1
C. 2, 5, 3, 1, 4
D. 4, 5, 2, 3, 1
Involvement of senior management is MOST important in the development of:
A. IT security procedures
B. IT security implementation plans
C. Standards and guidelines
D. IT security policies
Security related breaches are assessed and contained through which of the following?
A. The IT support team
B. A forensic analysis
C. Physical security team
D. Incident response
The ability to demand the implementation and management of security controls on third parties providing services to an organization is_________________________.
A. Disaster recovery
B. Security Governance
C. Vendor management
D. Compliance management
The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called____________________.
A. Security certification
B. Security accreditation
C. Alignment with business practices and goals.
D. Security system analysis
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
A. Deep-Packet inspection
B. Traffic Analysis
C. Heuristic analysis
D. Packet sampling
Which wireless encryption technology makes use of temporal keys?
A. Wi-Fi Protected Access version 2 (WPA2)
B. Wireless Equivalence Protocol (WEP)
C. Wireless Application Protocol (WAP)
D. Extensible Authentication Protocol (EAP)
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The cipher text sent by the AP is encrypted with the same key and cipher used by its stations.
What authentication method is being used?
A. Open
B. Asynchronous
C. None
D. Shared key
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called___________________.
A. Security certification
B. Security system analysis
C. Alignment with business practices and goals
D. Security accreditation
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 712-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.