Exam Details

  • Exam Code
    :512-50
  • Exam Name
    :EC-Council Information Security Manager (E|ISM)
  • Certification
    :EISM
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :404 Q&As
  • Last Updated
    :Apr 18, 2024

EC-COUNCIL EISM 512-50 Questions & Answers

  • Question 1:

    Which of the following terms is used to describe countermeasures implemented to minimize risks to physical property, information, and computing systems?

    A. Security frameworks

    B. Security policies

    C. Security awareness

    D. Security controls

  • Question 2:

    What are the three hierarchically related aspects of strategic planning and in which order should they be done?

    A. 1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity or information security strategic planning

    B. 1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Information technology strategic planning

    C. 1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity or information security strategic planning

    D. 1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Information technology strategic planning

  • Question 3:

    When project costs continually increase throughout implementation due to large or rapid changes in customer or user requirements, this is commonly known as:

    A. Cost/benefit adjustments

    B. Scope creep

    C. Prototype issues

    D. Expectations management

  • Question 4:

    When updating the security strategic planning document what two items must be included?

    A. Alignment with the business goals and the vision of the CIO

    B. The risk tolerance of the company and the company mission statement

    C. The executive summary and vision of the board of directors

    D. The alignment with the business goals and the risk tolerance

  • Question 5:

    Which of the following is a primary method of applying consistent configurations to IT systems?

    A. Audits

    B. Administration

    C. Patching

    D. Templates

  • Question 6:

    Which of the following is the MOST effective method for discovering common technical vulnerabilities within the IT environment?

    A. Reviewing system administrator logs

    B. Auditing configuration templates

    C. Checking vendor product releases

    D. Performing system scans

  • Question 7:

    SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

    The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning. Which of the following is the MOST logical next step?

    A. Validate the effectiveness of current controls

    B. Create detailed remediation funding and staffing plans

    C. Report the audit findings and remediation status to business stake holders

    D. Review security procedures to determine if they need modified according to findings

  • Question 8:

    Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18 members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit team, the project manager is convinced to add a quality professional to lead to test team at additional cost to the project.

    The project manager is aware of the importance of communication for the success of the project and takes the step of introducing additional communication channels, making it more complex, in order to assure quality levels of the project.

    What will be the first project management document that Smith should change in order to accommodate additional communication channels?

    A. WBS document

    B. Scope statement

    C. Change control document

    D. Risk management plan

  • Question 9:

    SCENARIO: Critical servers show signs of erratic behavior within your organization's intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.

    During initial investigation, the team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical aspect of the team's activities?

    A. Regular communication of incident status to executives

    B. Eradication of malware and system restoration

    C. Determination of the attack source

    D. Preservation of information

  • Question 10:

    Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.

    You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?

    A. Conduct background checks on individuals before hiring them

    B. Develop an Information Security Awareness program

    C. Monitor employee browsing and surfing habits

    D. Set your firewall permissions aggressively and monitor logs regularly.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.