Which type of physical security control scan a person's external features through a digital video camera before granting access to a restricted area?
A. Iris scan
B. Retinal scan
C. Facial recognition scan D. Signature kinetics scan
Using the Transport Layer Security (TLS) protocol enables a client in a network to be:
A. Provided with a digital signature
B. Assured of the server's identity
C. Identified by a network
D. Registered by the server
Which type of scan is used on the eye to measure the layer of blood vessels?
A. Facial recognition scan
B. Iris scan
C. Signature kinetics scan
D. Retinal scan
SCENARIO: Critical servers show signs of erratic behavior within your organization's intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
A. Response
B. Investigation
C. Recovery
D. Follow-up
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
A. Inability to export the private certificate/key
B. It can double as physical identification at the DMV
C. It has the user's photograph to help ID them
D. It can be used as a secure flash drive
The network administrator wants to strengthen physical security in the organization.
Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials.
Which of following physical security measures should the administrator use?
A. Video surveillance
B. Mantrap
C. Bollards
D. Fence
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
What action should you take FIRST?
A. Destroy the repository of stolen data
B. Contact your local law enforcement agency
C. Consult with other C-Level executives to develop an action plan
D. Contract with a credit reporting company for paid monitoring services for affected customers
At what level of governance are individual projects monitored and managed?
A. Program
B. Milestone
C. Enterprise
D. Portfolio
Which of the following best describes revenue?
A. Non-operating financial liabilities minus expenses
B. The true profit-making potential of an organization
C. The sum value of all assets and cash flow into the business
D. The economic benefit derived by operating a business
The formal certification and accreditation process has four primary steps, what are they?
A. Evaluating, describing, testing and authorizing
B. Evaluating, purchasing, testing, authorizing
C. Auditing, documenting, verifying, certifying
D. Discovery, testing, authorizing, certifying
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.