EC-Council 512-50 EC-Council Information Security Manager (E|ISM) Online Training
EC-Council 512-50 Online Training
The questions for 512-50 were last updated at Nov 23,2024.
- Exam Code: 512-50
- Exam Name: EC-Council Information Security Manager (E|ISM)
- Certification Provider: EC-Council
- Latest update: Nov 23,2024
Which of the following intellectual Property components is focused on maintaining brand recognition?
- A . Trademark
- B . Patent
- C . Research Logs
- D . Copyright
Developing effective security controls is a balance between:
- A . Risk Management and Operations
- B . Corporate Culture and Job Expectations
- C . Operations and Regulations
- D . Technology and Vendor Management
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
- A . Due Protection
- B . Due Care
- C . Due Compromise
- D . Due process
The Information Security Governance program MUST:
- A . integrate with other organizational governance processes
- B . support user choice for Bring Your Own Device (BYOD)
- C . integrate with other organizational governance processes
- D . show a return on investment for the organization
The alerting, monitoring and life-cycle management of security related events is typically handled by the
- A . security threat and vulnerability management process
- B . risk assessment process
- C . risk management process
- D . governance, risk, and compliance tools
Which of the following is a weakness of an asset or group of assets that can be exploited by one or more threats?
- A . Threat
- B . Vulnerability
- C . Attack vector
- D . Exploitation
The success of the Chief Information Security Officer is MOST dependent upon:
- A . favorable audit findings
- B . following the recommendations of consultants and contractors
- C . development of relationships with organization executives
- D . raising awareness of security issues with end users
You have purchased a new insurance policy as part of your risk strategy.
Which of the following risk strategy options have you engaged in?
- A . Risk Avoidance
- B . Risk Acceptance
- C . Risk Transfer
- D . Risk Mitigation
You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the
- A . Controlled mitigation effort
- B . Risk impact comparison
- C . Relative likelihood of event
- D . Comparative threat analysis
When dealing with a risk management process, asset classification is important because it will impact the overall:
- A . Threat identification
- B . Risk monitoring
- C . Risk treatment
- D . Risk tolerance