Download EC-Council Information Security Manager.512-50.PracticeTest.2019-03-19.126q.vcex

Vendor: ECCouncil
Exam Code: 512-50
Exam Name: EC-Council Information Security Manager
Date: Mar 19, 2019
File Size: 83 KB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Developing effective security controls is a balance between:
  1. Risk Management and Operations
  2. Corporate Culture and Job Expectations
  3. Operations and Regulations
  4. Technology and Vendor Management
Correct answer: A
Question 2
The PRIMARY objective for information security program development should be:
  1. Reducing the impact of the risk to the business.
  2. Establishing strategic alignment with bunsiness continuity requirements
  3. Establishing incident response programs.
  4. Identifying and implementing the best security solutions.
Correct answer: A
Question 3
Which of the following should be determined while defining risk management strategies?
  1. Organizational objectives and risk tolerance
  2. Risk assessment criteria
  3. IT architecture complexity
  4. Enterprise disaster recovery plans
Correct answer: A
Question 4
Who in the organization determines access to information?
  1. Legal department
  2. Compliance officer
  3. Data Owner
  4. Information security officer
Correct answer: C
Question 5
Which of the following is a benefit of information security governance?
  1. Questioning the trust in vendor relationships.
  2. Increasing the risk of decisions based on incomplete management information.
  3. Direct involvement of senior management in developing control processes
  4. Reduction of the potential for civil and legal liability
Correct answer: D
Question 6
Which of the following is the MOST important benefit of an effective security governance process?
  1. Reduction of liability and overall risk to the organization
  2. Better vendor management
  3. Reduction of security breaches
  4. Senior management participation in the incident response process
Correct answer: A
Question 7
The FIRST step in establishing a security governance program is to?
  1. Conduct a risk assessment.
  2. Obtain senior level sponsorship.
  3. Conduct a workshop for all end users.
  4. Prepare a security budget.
Correct answer: B
Question 8
Which of the following has the GREATEST impact on the implementation of an information security governance model?
  1. Organizational budget
  2. Distance between physical locations
  3. Number of employees
  4. Complexity of organizational structure
Correct answer: D
Question 9
From an information security perspective, information that no longer supports the main purpose of the business should be:
  1. assessed by a business impact analysis.
  2. protected under the information classification policy.
  3. analyzed under the data ownership policy.
  4. analyzed under the retention policy
Correct answer: D
Question 10
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
  1. information security metrics.
  2. knowledge required to analyze each issue.
  3. baseline against which metrics are evaluated.
  4. linkage to business area objectives.
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!