This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Fri May 17 17:35:36 2024 / +0000 GMT ___________________________________________________ Title: [2021-February-New]100% Success-Braindump2go 712-50 PDF and 712-50 VCE 712-50 405 Instant Download[Q351-Q371] --------------------------------------------------- 2021/February Latest Braindump2go 712-50 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 712-50 Real Exam Questions!QUESTION 351Which type of physical security control scan a person's external features through a digital video camera before granting access to a restricted area?A. Iris scanB. Retinal scanC. Facial recognition scanD. Signature kinetics scanAnswer: CQUESTION 352Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?A. Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure doorB. Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special cardC. Educate and enforce physical security policies of the company to all the employees on a regular basisD. Setup a mock video camera next to the special card reader adjacent to the secure doorAnswer: CQUESTION 353Which type of scan is used on the eye to measure the layer of blood vessels?A. Facial recognition scanB. Iris scanC. Signature kinetics scanD. Retinal scanAnswer: DQUESTION 354A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?A. Shoulder surfingB. TailgatingC. Social engineeringD. MantrapAnswer: BQUESTION 355Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18 members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit team, the project manager is convinced to add a quality professional to lead to test team at additional cost to the project.The project manager is aware of the importance of communication for the success of the project and takes the step of introducing additional communication channels, making it more complex, in order to assure quality levels of the project. What will be the first project management document that Smith should change in order to accommodate additional communication channels?A. WBS documentB. Scope statementC. Change control documentD. Risk management planAnswer: AQUESTION 356If the result of an NPV is positive, then the project should be selected. The net present value shows the present value of the project, based on the decisions taken for its selection. What is the net present value equal to?A. Net profit ?per capita incomeB. Total investment ?Discounted cashC. Average profit ?Annual investmentD. Initial investment ?Future valueAnswer: CQUESTION 357If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization. How would you prevent such type of attacks?A. Conduct thorough background checks before you engage themB. Hire the people through third-party job agencies who will vet them for youC. Investigate their social networking profilesD. It is impossible to block these attacksAnswer: AQUESTION 358A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?A. Effective use of existing technologiesB. Create a comprehensive security awareness program and provide success metrics to business unitsC. Proper budget managementD. Leveraging existing implementationsAnswer: BQUESTION 359Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda. From an Information Security Leadership perspective, which of the following is a MAJOR concern about the CISO's approach to security?A. Compliance centric agendaB. IT security centric agendaC. Lack of risk management processD. Lack of sponsorship from executive managementAnswer: BQUESTION 360A CISO has implemented a risk management capability within the security portfolio. Which of the following terms best describes this functionality?A. ServiceB. ProgramC. PortfolioD. Cost centerAnswer: BQUESTION 361Using the Transport Layer Security (TLS) protocol enables a client in a network to be:A. Provided with a digital signatureB. Assured of the server's identityC. Identified by a networkD. Registered by the serverAnswer: BExplanation:https://ukdiss.com/examples/tls.phpQUESTION 362The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?A. Video surveillanceB. MantrapC. BollardsD. FenceAnswer: DQUESTION 363Which of the following is the MOST logical method of deploying security controls within an organization?A. Obtain funding for all desired controls and then create project plans for implementationB. Apply the simpler controls as quickly as possible and use a risk-based approach for the more difficult and costly controlsC. Apply the least costly controls to demonstrate positive program activityD. Obtain business unit buy-in through close communication and coordinationAnswer: BQUESTION 364Which of the following is a primary method of applying consistent configurations to IT systems?A. AuditsB. AdministrationC. PatchingD. TemplatesAnswer: CQUESTION 365Where does bottom-up financial planning primarily gain information for creating budgets?A. By adding all capital and operational costs from the prior budgetary cycle, and determining potential financial shortagesB. By reviewing last year's program-level costs and adding a percentage of expected additional portfolio costsC. By adding the cost of all known individual tasks and projects that are planned for the next budgetary cycleD. By adding all planned operational expenses per quarter then summarizing them in a budget requestAnswer: DQUESTION 366Which of the following best describes revenue?A. Non-operating financial liabilities minus expensesB. The true profit-making potential of an organizationC. The sum value of all assets and cash flow into the businessD. The economic benefit derived by operating a businessAnswer: DExplanation:https://www.investopedia.com/terms/r/revenue.aspQUESTION 367Which of the following is the MOST effective method for discovering common technical vulnerabilities within the IT environment?A. Reviewing system administrator logsB. Auditing configuration templatesC. Checking vendor product releasesD. Performing system scansAnswer: DQUESTION 368When project costs continually increase throughout implementation due to large or rapid changes in customer or user requirements, this is commonly known as:A. Cost/benefit adjustmentsB. Scope creepC. Prototype issuesD. Expectations managementAnswer: BExplanation:http://www.umsl.edu/~sauterv/analysis/6840_f03_papers/gurlen/QUESTION 369During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her annual budget. What is the condition of her current budgetary posture?A. The budget is in a temporary state of imbalanceB. The budget is operating at a deficitC. She can realign the budget through moderate capital expense (CAPEX) allocationD. She has a surplus of operational expenses (OPEX)Answer: AQUESTION 370The primary purpose of a risk register is to:A. Maintain a log of discovered risksB. Track individual risk assessmentsC. Develop plans for mitigating identified risksD. Coordinate the timing of scheduled risk assessmentsAnswer: AExplanation:https://sitemate.com/us/resources/articles/safety/purpose-of-a-risk-register/QUESTION 371If a Virtual Machine's (VM) data is being replicated and that data is corrupted, this corruption will automatically be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?A. Backup to tapeB. Maintain separate VM backupsC. Backup to a remote locationD. Increase VM replication frequencyAnswer: BExplanation:https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/is-audit-basics-backup- and-recoveryResources From:1.2021 Latest Braindump2go 712-50 Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/712-50.html2.2021 Latest Braindump2go 712-50 PDF and 712-50 VCE Dumps Free Share:https://drive.google.com/drive/folders/1Th-259mRWSeetI20FPdeU_Na8TegTWwA?usp=sharing3.2020 Free Braindump2go 712-50 PDF Download:https://www.braindump2go.com/free-online-pdf/712-50-PDF(363-375).pdfhttps://www.braindump2go.com/free-online-pdf/712-50-PDF-Dumps(351-362).pdfhttps://www.braindump2go.com/free-online-pdf/712-50-VCE(390-405).pdfhttps://www.braindump2go.com/free-online-pdf/712-50-VCE-Dumps(376-389).pdfFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2021-02-02 07:19:37 Post date GMT: 2021-02-02 07:19:37 Post modified date: 2021-02-02 07:19:37 Post modified date GMT: 2021-02-02 07:19:37 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com