Pass4itsure > EC-COUNCIL > EISM > 512-50 > 512-50 Online Practice Questions and Answers

512-50 Online Practice Questions and Answers

Questions 4

Who is responsible for securing networks during a security incident?

A. Chief Information Security Officer (CISO)

B. Security Operations Center (SO

C. Disaster Recovery (DR) manager

D. Incident Response Team (IRT)

Buy Now
Questions 5

When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?

A. How many credit card records are stored?

B. How many servers do you have?

C. What is the scope of the certification?

D. What is the value of the assets at risk?

Buy Now
Questions 6

Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?

A. Single loss expectancy multiplied by the annual rate of occurrence

B. Total loss expectancy multiplied by the total loss frequency

C. Value of the asset multiplied by the loss expectancy

D. Replacement cost multiplied by the single loss expectancy

Buy Now
Questions 7

Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?

A. Lack of notification to the public of disclosure of confidential information.

B. Lack of periodic examination of access rights

C. Failure to notify police of an attempted intrusion

D. Lack of reporting of a successful denial of service attack on the network.

Buy Now
Questions 8

Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?

A. All vulnerabilities found on servers and desktops

B. Only critical and high vulnerabilities on servers and desktops

C. Only critical and high vulnerabilities that impact important production servers

D. All vulnerabilities that impact important production servers

Buy Now
Questions 9

Which of the following activities results in change requests?

A. Preventive actions

B. Inspection

C. Defect repair

D. Corrective actions

Buy Now
Questions 10

Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of

A. Network based security preventative controls

B. Software segmentation controls

C. Network based security detective controls

D. User segmentation controls

Buy Now
Questions 11

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

The organization wants a more permanent solution to the threat to user credential compromise through phishing.

What technical solution would BEST address this issue?

A. Professional user education on phishing conducted by a reputable vendor

B. Multi-factor authentication employing hard tokens

C. Forcing password changes every 90 days

D. Decreasing the number of employees with administrator privileges

Buy Now
Questions 12

What is the BEST reason for having a formal request for proposal process?

A. Creates a timeline for purchasing and budgeting

B. Allows small companies to compete with larger companies

C. Clearly identifies risks and benefits before funding is spent

D. Informs suppliers a company is going to make a purchase

Buy Now
Questions 13

What process defines the framework of rules and practices by which a board of directors ensure accountability, fairness and transparency in an organization's relationship with its shareholders?

A. Internal Audit

B. Corporate governance

C. Risk Oversight

D. Key Performance Indicators

Buy Now
Exam Code: 512-50
Exam Name: EC-Council Information Security Manager (E|ISM)
Last Update: Apr 22, 2024
Questions: 404
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99