Exam Details

  • Exam Code
    :512-50
  • Exam Name
    :EC-Council Information Security Manager (E|ISM)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :404 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 512-50 Questions & Answers

  • Question 201:

    Risk appetite is typically determined by which of the following organizational functions?

    A. Security

    B. Business units

    C. Board of Directors

    D. Audit and compliance

  • Question 202:

    Which of the following is critical in creating a security program aligned with an organization's goals?

    A. Ensure security budgets enable technical acquisition and resource allocation based on internal compliance requirements

    B. Develop a culture in which users, managers and IT professionals all make good decisions about information risk

    C. Provide clear communication of security program support requirements and audit schedules

    D. Create security awareness programs that include clear definition of security program goals and charters

  • Question 203:

    In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?

    A. Vmware, router, switch, firewall, syslog, vulnerability management system (VMS)

    B. Intrusion Detection System (IDS), firewall, switch, syslog

    C. Security Incident Event Management (SIEM), IDS, router, syslog

    D. SIEM, IDS, firewall, VMS

  • Question 204:

    An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?

    A. The CISO

    B. Audit and Compliance

    C. The CFO

    D. The business owner

  • Question 205:

    An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?

    A. Time zone differences

    B. Compliance to local hiring laws

    C. Encryption import/export regulations

    D. Local customer privacy laws

  • Question 206:

    A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?

    A. Lack of asset management processes

    B. Lack of change management processes

    C. Lack of hardening standards

    D. Lack of proper access controls

  • Question 207:

    The ultimate goal of an IT security projects is:

    A. Increase stock value

    B. Complete security

    C. Support business requirements

    D. Implement information security policies

  • Question 208:

    Your incident response plan should include which of the following?

    A. Procedures for litigation

    B. Procedures for reclamation

    C. Procedures for classification

    D. Procedures for charge-back

  • Question 209:

    When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?

    A. Vendors uses their own laptop and logins with same admin credentials your security team uses

    B. Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses

    C. Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials

    D. Vendor uses their own laptop and logins using two factor authentication with their own unique credentials

  • Question 210:

    A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?

    A. Security alignment to business goals

    B. Regulatory compliance effectiveness

    C. Increased security program presence

    D. Proper organizational policy enforcement

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.