Certified Ethical Hacker – CEH – 312-50 – Question224

Which of the following guidelines or standards is associated with the credit card industry?


A.
Control Objectives for Information and Related Technology (COBIT)
B. Sarbanes-Oxley Act (SOX)
C. Health Insurance Portability and Accountability Act (HIPAA)
D. Payment Card Industry Data Security Standards (PCI DSS)

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question222

How can a policy help improve an employee's security awareness?


A.
By implementing written security procedures, enabling employee security training, and promoting the benefits of security
B. By using informal networks of communication, establishing secret passing procedures, and immediately terminating employees
C. By sharing security secrets with employees, enabling employees to share secrets, and establishing a consultative help line
D. By decreasing an employee's vacation time, addressing ad-hoc employment clauses, and ensuring that managers know employee strengths

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question221

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?


A.
Sarbanes-Oxley Act (SOX)
B. Gramm-Leach-Bliley Act (GLBA)
C. Fair and Accurate Credit Transactions Act (FACTA)
D. Federal Information Security Management Act (FISMA)

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question220

When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?


A.
At least once a year and after any significant upgrade or modification
B. At least once every three years or after any significant upgrade or modification
C. At least twice a year or after any significant upgrade or modification
D. At least once every two years and after any significant upgrade or modification

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question217

How do employers protect assets with security policies pertaining to employee surveillance activities?


A.
Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.
B. Employers use informal verbal communication channels to explain employee monitoring activities to employees.
C. Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.
D. Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question216

Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?


A.
Incident response services to any user, company, government agency, or organization in partnership with the Department of Homeland Security
B. Maintenance of the nations Internet infrastructure, builds out new Internet infrastructure, and decommissions old Internet infrastructure
C. Registration of critical penetration testing for the Department of Homeland Security and public and private sectors
D. Measurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department, as well as private sectors

Correct Answer: A