Vcehome > EC-COUNCIL > EISM > 512-50 > 512-50 Online Practice Questions and Answers

512-50 Online Practice Questions and Answers

Questions 4

What is the definition of Risk in Information Security?

A. Risk = Probability x Impact

B. Risk = Threat x Probability

C. Risk = Financial Impact x Probability

D. Risk = Impact x Threat

Browse 404 Q&As
Questions 5

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

A. Deploy a SEIM solution and have current staff review incidents first thing in the morning

B. Contract with a managed security provider and have current staff on recall for incident response

C. Configure your syslog to send SMS messages to current staff when target events are triggered

D. Employ an assumption of breach protocol and defend only essential information resources

Browse 404 Q&As
Questions 6

Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?

A. Terms and Conditions

B. Service Level Agreements (SLA)

C. Statement of Work

D. Key Performance Indicators (KPI)

Browse 404 Q&As
Questions 7

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

A. Trusted and untrusted networks

B. Type of authentication

C. Storage encryption

D. Log retention

Browse 404 Q&As
Questions 8

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

A. The need to change accounting periods on a regular basis.

B. The requirement to post entries for a closed accounting period.

C. The need to create and modify the chart of accounts and its allocations.

D. The lack of policies and procedures for the proper segregation of duties.

Browse 404 Q&As
Questions 9

Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?

A. Comprehensive Log-Files from all servers and network devices affected during the attack

B. Fully trained network forensic experts to analyze all data right after the attack

C. Uninterrupted Chain of Custody

D. Expert forensics witness

Browse 404 Q&As
Questions 10

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

A. chain of custody.

B. electronic discovery.

C. evidence tampering.

D. electronic review.

Browse 404 Q&As
Questions 11

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

The organization wants a more permanent solution to the threat to user credential compromise through phishing.

What technical solution would BEST address this issue?

A. Professional user education on phishing conducted by a reputable vendor

B. Multi-factor authentication employing hard tokens

C. Forcing password changes every 90 days

D. Decreasing the number of employees with administrator privileges

Browse 404 Q&As
Questions 12

The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called

A. Security certification

B. Security system analysis

C. Security accreditation

D. Alignment with business practices and goals.

Browse 404 Q&As
Questions 13

File Integrity Monitoring (FIM) is considered a A. Network based security preventative control

B. Software segmentation control

C. Security detective control

D. User segmentation control

Browse 404 Q&As
Exam Code: 512-50
Exam Name: EC-Council Information Security Manager (E|ISM)
Last Update: Apr 30, 2024
Questions: 404 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99