Free 712-50 Exam Dumps

Question 26

- (Topic 1)
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?

Correct Answer:C

Question 27

- (Topic 2)
Which of the following illustrates an operational control process:

Correct Answer::B

Question 28

- (Topic 5)
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?

Correct Answer:B

Question 29

- (Topic 4)
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?

Correct Answer:D

Question 30

- (Topic 4)
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Solution:


Does this meet the goal?

Correct Answer:A