Exam Details

  • Exam Code
    :512-50
  • Exam Name
    :EC-Council Information Security Manager (E|ISM)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :404 Q&As
  • Last Updated
    :Mar 30, 2025

EC-COUNCIL EC-COUNCIL Certifications 512-50 Questions & Answers

  • Question 121:

    As the CISO, you have been tasked with the execution of the company's key management program. You MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key control will ensure no single individual can constitute or re-constitute a key?

    A. Dual Control

    B. Separation of Duties

    C. Split Knowledge

    D. Least Privilege

  • Question 122:

    Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:

    A. Create timelines for mitigation

    B. Develop a cost-benefit analysis

    C. Calculate annual loss expectancy

    D. Create a detailed technical executive summary

  • Question 123:

    Which of the following is an accurate statement regarding capital expenses?

    A. They are easily reduced through the elimination of usage, such as reducing power for lighting of work areas during off-hours

    B. Capital expenses can never be replaced by operational expenses

    C. Capital expenses are typically long-term investments with value being realized through their use

    D. The organization is typically able to regain the initial cost by selling this type of asset

  • Question 124:

    What is the difference between encryption and tokenization?

    A. Tokenization combined with hashing is always better than encryption

    B. Encryption can be mathematically reversed to provide the original information

    C. The token contains the all original information

    D. Tokenization can be mathematically reversed to provide the original information

  • Question 125:

    Which of the following best describes an access control process that confirms the identity of the entity seeking access to a logical or physical area?

    A. Identification

    B. Authorization

    C. Authentication

    D. Accountability

  • Question 126:

    SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

    Which of the following is the FIRST action the CISO will perform after receiving the audit report?

    A. Inform peer executives of the audit results

    B. Validate gaps and accept or dispute the audit findings

    C. Create remediation plans to address program gaps

    D. Determine if security policies and procedures are adequate

  • Question 127:

    If a Virtual Machine's (VM) data is being replicated and that data is corrupted, this corruption will automatically be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?

    A. Backup to tape

    B. Maintain separate VM backups

    C. Backup to a remote location

    D. Increase VM replication frequency

  • Question 128:

    The primary purpose of a risk register is to:

    A. Maintain a log of discovered risks

    B. Track individual risk assessments

    C. Develop plans for mitigating identified risks

    D. Coordinate the timing of scheduled risk assessments

  • Question 129:

    A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

    A. non-repudiation

    B. conflict resolution

    C. strong authentication

    D. digital rights management

  • Question 130:

    Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of

    A. Network based security preventative controls

    B. Software segmentation controls

    C. Network based security detective controls

    D. User segmentation controls

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.