Free 712-50 Exam Dumps

Question 86

- (Topic 3)
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?

Correct Answer:C

Question 87

- (Topic 5)
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:

Correct Answer:A

Question 88

- (Topic 4)
Which of the following backup sites takes the longest recovery time?

Correct Answer:A

Question 89

- (Topic 3)
A recommended method to document the respective roles of groups and individuals for a given process is to:

Correct Answer:D

Question 90

- (Topic 5)
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system’s scalability. This demonstrates which of the following?

Correct Answer:D