New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Vce 712-50 Questions Latest

Page: 19 / 34
Question 76

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

1.Covering tracks

2.Scanning and enumeration

3.Maintaining Access

4.Reconnaissance

5.Gaining Access

Options:

A.

4, 2, 5, 3, 1

B.

2, 5, 3, 1, 4

C.

4, 5, 2, 3, 1

D.

4, 3, 5, 2, 1

Question 77

What is the FIRST step in developing the vulnerability management program?

Options:

A.

Baseline the Environment

B.

Maintain and Monitor

C.

Organization Vulnerability

D.

Define Policy

Question 78

Which of the following is a symmetric encryption algorithm?

Options:

A.

3DES

B.

MD5

C.

ECC

D.

RSA

Question 79

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Options:

A.

Trusted and untrusted networks

B.

Type of authentication

C.

Storage encryption

D.

Log retention

Page: 19 / 34
Exam Code: 712-50
Exam Name: EC-Council Certified CISO (CCISO)
Last Update: Dec 27, 2024
Questions: 460
712-50 pdf

712-50 PDF

$25.5  $84.99
712-50 Engine

712-50 Testing Engine

$28.5  $94.99
712-50 PDF + Engine

712-50 PDF + Testing Engine

$40.5  $134.99