Exam Details

  • Exam Code
    :512-50
  • Exam Name
    :EC-Council Information Security Manager (E|ISM)
  • Certification
    :EISM
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :404 Q&As
  • Last Updated
    :May 09, 2024

EC-COUNCIL EISM 512-50 Questions & Answers

  • Question 391:

    If your organization operates under a model of "assumption of breach", you should:

    A. Protect all information resource assets equally

    B. Establish active firewall monitoring protocols

    C. Purchase insurance for your compliance liability

    D. Focus your security efforts on high value assets

  • Question 392:

    Which of the following international standards can be BEST used to define a Risk Management process in an organization?

    A. National Institute for Standards and Technology 800-50 (NIST 800-50)

    B. International Organization for Standardizations ?27005 (ISO-27005)

    C. Payment Card Industry Data Security Standards (PCI-DSS)

    D. International Organization for Standardizations ?27004 (ISO-27004)

  • Question 393:

    What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

    A. Determine appetite

    B. Evaluate risk avoidance criteria

    C. Perform a risk assessment

    D. Mitigate risk

  • Question 394:

    Risk appetite directly affects what part of a vulnerability management program?

    A. Staff

    B. Scope

    C. Schedule

    D. Scan tools

  • Question 395:

    Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?

    A. Need to comply with breach disclosure laws

    B. Need to transfer the risk associated with hosting PII data

    C. Need to better understand the risk associated with using PII data

    D. Fiduciary responsibility to safeguard credit card information

  • Question 396:

    With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:

    A. Metrics tracking security milestones, understanding criticality of information and information security, visibility into the types of information and how it is used, endorsement by the board of directors

    B. Annual security training for all employees, continual budget reviews, endorsement of the development and implementation of a security program, metrics to track the program

    C. Understanding criticality of information and information security, review investment in information security, endorse development and implementation of a security program, and require regular reports on adequacy and effectiveness

    D. Endorsement by the board of directors for security program, metrics of security program milestones, annual budget review, report on integration and acceptance of program

  • Question 397:

    What is the MAIN reason for conflicts between Information Technology and Information Security programs?

    A. Technology governance defines technology policies and standards while security governance does not.

    B. Security governance defines technology best practices and Information Technology governance does not.

    C. Technology Governance is focused on process risks whereas Security Governance is focused on business risk.

    D. The effective implementation of security controls can be viewed as an inhibitor to rapid Information Technology implementations.

  • Question 398:

    Within an organization's vulnerability management program, who has the responsibility to implement remediation actions?

    A. Security officer

    B. Data owner

    C. Vulnerability engineer

    D. System administrator

  • Question 399:

    When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it

    A. In promiscuous mode and only detect malicious traffic.

    B. In-line and turn on blocking mode to stop malicious traffic.

    C. In promiscuous mode and block malicious traffic.

    D. In-line and turn on alert mode to stop malicious traffic.

  • Question 400:

    When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?

    A. An independent Governance, Risk and Compliance organization

    B. Alignment of security goals with business goals

    C. Compliance with local privacy regulations

    D. Support from Legal and HR teams

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.