Download EC-Council Information Security Manager (EISM).PracticeTest.512-50.2019-03-19.2e.126q.vcex

Download Exam

File Info

Exam EC-Council Information Security Manager
Number 512-50
File Name EC-Council Information Security Manager (EISM).PracticeTest.512-50.2019-03-19.2e.126q.vcex
Size 83 Kb
Posted March 19, 2019
Downloads 57

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Developing effective security controls is a balance between:

  • A: Risk Management and Operations
  • B: Corporate Culture and Job Expectations
  • C: Operations and Regulations
  • D: Technology and Vendor Management

Question 2
The PRIMARY objective for information security program development should be:

  • A: Reducing the impact of the risk to the business.
  • B: Establishing strategic alignment with bunsiness continuity requirements
  • C: Establishing incident response programs.
  • D: Identifying and implementing the best security solutions.

Question 3
Which of the following should be determined while defining risk management strategies?

  • A: Organizational objectives and risk tolerance
  • B: Risk assessment criteria
  • C: IT architecture complexity
  • D: Enterprise disaster recovery plans

Question 4
Who in the organization determines access to information?

  • A: Legal department
  • B: Compliance officer
  • C: Data Owner
  • D: Information security officer

Question 5
Which of the following is a benefit of information security governance?

  • A: Questioning the trust in vendor relationships.
  • B: Increasing the risk of decisions based on incomplete management information.
  • C: Direct involvement of senior management in developing control processes
  • D: Reduction of the potential for civil and legal liability

Question 6
Which of the following is the MOST important benefit of an effective security governance process?

  • A: Reduction of liability and overall risk to the organization
  • B: Better vendor management
  • C: Reduction of security breaches
  • D: Senior management participation in the incident response process

Question 7
The FIRST step in establishing a security governance program is to?

  • A: Conduct a risk assessment.
  • B: Obtain senior level sponsorship.
  • C: Conduct a workshop for all end users.
  • D: Prepare a security budget.

Question 8
Which of the following has the GREATEST impact on the implementation of an information security governance model?

  • A: Organizational budget
  • B: Distance between physical locations
  • C: Number of employees
  • D: Complexity of organizational structure

Question 9
From an information security perspective, information that no longer supports the main purpose of the business should be:

  • A: assessed by a business impact analysis.
  • B: protected under the information classification policy.
  • C: analyzed under the data ownership policy.
  • D: analyzed under the retention policy

Question 10
When briefing senior management on the creation of a governance process, the MOST important aspect should be:

  • A: information security metrics.
  • B: knowledge required to analyze each issue.
  • C: baseline against which metrics are evaluated.
  • D: linkage to business area objectives.


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files