EC-Council 512-50 EC-Council Information Security Manager (E|ISM) Online Training
EC-Council 512-50 Online Training
The questions for 512-50 were last updated at Nov 23,2024.
- Exam Code: 512-50
- Exam Name: EC-Council Information Security Manager (E|ISM)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Why is it vitally important that senior management endorse a security policy?
- A . So that they will accept ownership for security within the organization.
- B . So that employees will follow the policy directives.
- C . So that external bodies will recognize the organizations commitment to security.
- D . So that they can be held legally accountable.
Who is responsible for securing networks during a security incident?
- A . Chief Information Security Officer (CISO)
- B . Security Operations Center (SO
- C . Disaster Recovery (DR) manager
- D . Incident Response Team (IRT)
Which of the following is the MOST important benefit of an effective security governance process?
- A . Reduction of liability and overall risk to the organization
- B . Better vendor management
- C . Reduction of security breaches
- D . Senior management participation in the incident response process
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
- A . Susceptibility to attack, mitigation response time, and cost
- B . Attack vectors, controls cost, and investigation staffing needs
- C . Vulnerability exploitation, attack recovery, and mean time to repair
- D . Susceptibility to attack, expected duration of attack, and mitigation availability
Who in the organization determines access to information?
- A . Legal department
- B . Compliance officer
- C . Data Owner
- D . Information security officer
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units.
Which of the following standards and guidelines can BEST address this organization’s need?
- A . International Organization for Standardizations C 22301 (ISO-22301)
- B . Information Technology Infrastructure Library (ITIL)
- C . Payment Card Industry Data Security Standards (PCI-DSS)
- D . International Organization for Standardizations C 27005 (ISO-27005)
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
- A . Audit and Legal
- B . Budget and Compliance
- C . Human Resources and Budget
- D . Legal and Human Resources
You have recently drafted a revised information security policy.
From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?
- A . Chief Information Security Officer
- B . Chief Executive Officer
- C . Chief Information Officer
- D . Chief Legal Counsel
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
- A . Compliance Risk
- B . Reputation Risk
- C . Operational Risk
- D . Strategic Risk
Which of the following has the GREATEST impact on the implementation of an information security governance model?
- A . Organizational budget
- B . Distance between physical locations
- C . Number of employees
- D . Complexity of organizational structure