EC-Council 512-50 EC-Council Information Security Manager (E|ISM) Online Training
EC-Council 512-50 Online Training
The questions for 512-50 were last updated at Nov 23,2024.
- Exam Code: 512-50
- Exam Name: EC-Council Information Security Manager (E|ISM)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
What is the relationship between information protection and regulatory compliance?
- A . That all information in an organization must be protected equally.
- B . The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy.
- C . That the protection of some information such as National ID information is mandated by regulation and other information such as trade secrets are protected based on business need.
- D . There is no relationship between the two.
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
- A . Strong authentication technologies
- B . Financial reporting regulations
- C . Credit card compliance and regulations
- D . Local privacy laws
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
- A . Subscribe to vendor mailing list to get notification of system vulnerabilities
- B . Deploy Intrusion Detection System (IDS) and install anti-virus on systems
- C . Configure firewall, perimeter router and Intrusion Prevention System (IPS)
- D . Conduct security testing, vulnerability scanning, and penetration testing
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
- A . High risk environments 6 months, low risk environments 12 months
- B . Every 12 months
- C . Every 18 months
- D . Every six months
Payment Card Industry (PCI) compliance requirements are based on what criteria?
- A . The types of cardholder data retained
- B . The duration card holder data is retained
- C . The size of the organization processing credit card data
- D . The number of transactions performed per year by an organization
When managing the security architecture for your company you must consider:
- A . Security and IT Staff size
- B . Company Values
- C . Budget
- D . All of the above
What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?
- A . Test every three years to ensure that things work as planned
- B . Conduct periodic tabletop exercises to refine the BC plan
- C . Outsource the creation and execution of the BC plan to a third party vendor
- D . Conduct a Disaster Recovery (DR) exercise every year to test the plan
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied.
What is the NEXT logical step in applying the controls in the organization?
- A . Determine the risk tolerance
- B . Perform an asset classification
- C . Create an architecture gap analysis
- D . Analyze existing controls on systems
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions.
This activity BEST demonstrates what part of a security program?
- A . Audit validation
- B . Physical control testing
- C . Compliance management
- D . Security awareness training
Which of the following should be determined while defining risk management strategies?
- A . Organizational objectives and risk tolerance
- B . Risk assessment criteria
- C . IT architecture complexity
- D . Enterprise disaster recovery plans