Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

EC-Council Information Security Manager (E|ISM)

Last Update 10 hours ago Total Questions : 404

The EC-Council Information Security Manager (E|ISM) content is now fully updated, with all current exam questions added 10 hours ago. Deciding to include 512-50 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 512-50 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 512-50 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Information Security Manager (E|ISM) practice test comfortably within the allotted time.

Question # 41

Which of the following is a primary method of applying consistent configurations to IT systems?

A.

Audits

B.

Administration

C.

Patching

D.

Templates

Question # 42

As the Chief Information Security Officer, you are performing an assessment of security posture to understand

what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows

to detect and actively stop vulnerability exploits and attacks?

A.

Gigamon

B.

Intrusion Prevention System

C.

Port Security

D.

Anti-virus

Question # 43

The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?

A.

Organization control

B.

Procedural control

C.

Management control

D.

Technical control

Question # 44

Control Objectives for Information and Related Technology (COBIT) is which of the following?

A.

An Information Security audit standard

B.

An audit guideline for certifying secure systems and controls

C.

A framework for Information Technology management and governance

D.

A set of international regulations for Information Technology governance

Question # 45

When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?

A.

Daily

B.

Hourly

C.

Weekly

D.

Monthly

Question # 46

At which point should the identity access management team be notified of the termination of an employee?

A.

At the end of the day once the employee is off site

B.

During the monthly review cycle

C.

Immediately so the employee account(s) can be disabled

D.

Before an audit

Question # 47

Which of the following activities must be completed BEFORE you can calculate risk?

A.

Determining the likelihood that vulnerable systems will be attacked by specific threats

B.

Calculating the risks to which assets are exposed in their current setting

C.

Assigning a value to each information asset

D.

Assessing the relative risk facing the organization’s information assets

Question # 48

Which International Organization for Standardization (ISO) below BEST describes the performance of risk management, and includes a five-stage risk management methodology.

A.

ISO 27001

B.

ISO 27002

C.

ISO 27004

D.

ISO 27005

Question # 49

Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.

Using the best business practices for project management, you determine that the project correctly aligns with the organization goals. What should be verified next?

A.

Scope

B.

Budget

C.

Resources

D.

Constraints

Question # 50

Which of the following is an accurate statement regarding capital expenses?

A.

They are easily reduced through the elimination of usage, such as reducing power for lighting of work areas

during off-hours

B.

Capital expenses can never be replaced by operational expenses

C.

Capital expenses are typically long-term investments with value being realized through their use

D.

The organization is typically able to regain the initial cost by selling this type of asset

Go to page: