Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 712-50 All Questions

View all questions & answers for the 712-50 exam

Exam 712-50 topic 1 question 305 discussion

Actual exam question from ECCouncil's 712-50
Question #: 305
Topic #: 1
[All 712-50 Questions]

Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations. You have decided to deal with risk to information from people first.
How can you minimize risk to your most sensitive information before granting access?

  • A. Set your firewall permissions aggressively and monitor logs regularly.
  • B. Develop an Information Security Awareness program
  • C. Conduct background checks on individuals before hiring them
  • D. Monitor employee drowsing and surfing habits
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
alfaMegatron
3 months, 1 week ago
Selected Answer: B
Awareness training suits best
upvoted 1 times
...
nshams
4 months, 1 week ago
Selected Answer: C
A background check is typically done after you finalize a candidate and before the employment contract is signed. What will be included in a background check depends on the nature of the job, exposure to sensitive information, and the level of check required.
upvoted 1 times
...
johndoe69
5 months, 3 weeks ago
Selected Answer: C
Conducting background checks on individuals before hiring them is a proactive measure to minimize risk to sensitive information. This step ensures that you are aware of any potential red flags or history of behavior that could pose a risk to your organization's information security. By carefully vetting employees before they are granted access to sensitive information, you can significantly reduce the likelihood of insider threats.
upvoted 1 times
...
arkb103
7 months, 1 week ago
Information security awareness are conducted for people who are already part of your company to improve their cyber awareness and practices and help secure your IT infrastructure. However the question is asking for what to do before even granting them access. That is why the background check is a good answer for this question.
upvoted 1 times
...
arifbhatkar
1 year, 4 months ago
Selected Answer: B
B. Develop an Information Security Awareness program. Developing an Information Security Awareness program is crucial for educating employees about the importance of protecting sensitive information and promoting secure practices. This program can include training sessions, workshops, and regular communication to raise awareness about security risks, policies, and best practices
upvoted 2 times
...
arifbhatkar
1 year, 4 months ago
B. Develop an Information Security Awareness program. Developing an Information Security Awareness program is crucial for educating employees about the importance of protecting sensitive information and promoting secure practices. This program can include training sessions, workshops, and regular communication to raise awareness about security risks, policies, and best practices
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...