Eccouncil
512-50
Q1:
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
○
A
Segmentation controls.○
B
Shadow applications.○
C
Deception technology.○
D
Vulnerability management.
Eccouncil
512-50
Q2:
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
○
A
Poorly configured firewalls○
B
Malware○
C
Advanced Persistent Threat (APT)○
D
An insider
Eccouncil
512-50
Q3:
A newly-hired CISO needs to understand the organization's financial management standards for business units
and operations. Which of the following would be the best source of this information?
○
A
The internal accounting department○
B
The Chief Financial Officer (CFO)○
C
The external financial audit service○
D
The managers of the accounts payables and accounts receivables teams
Eccouncil
512-50
Q4:
Which of the following is an accurate statement regarding capital expenses?
○
A
They are easily reduced through the elimination of usage, such as reducing power for lighting of work areasduring off-hours
○
B
Capital expenses can never be replaced by operational expenses○
C
Capital expenses are typically long-term investments with value being realized through their use○
D
The organization is typically able to regain the initial cost by selling this type of asset
Eccouncil
512-50
Q5:
Which of the following is a common technology for visual monitoring?
○
A
Closed circuit television○
B
Open circuit television○
C
Blocked video○
D
Local video