Exam Details

  • Exam Code
    :512-50
  • Exam Name
    :EC-Council Information Security Manager (E|ISM)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :404 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 512-50 Questions & Answers

  • Question 241:

    Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?

    A. Meet regulatory compliance requirements

    B. Better understand the threats and vulnerabilities affecting the environment

    C. Better understand strengths and weaknesses of the program

    D. Meet legal requirements

  • Question 242:

    Which of the following activities results in change requests?

    A. Preventive actions

    B. Inspection

    C. Defect repair

    D. Corrective actions

  • Question 243:

    Which of the following activities must be completed BEFORE you can calculate risk?

    A. Determining the likelihood that vulnerable systems will be attacked by specific threats

    B. Calculating the risks to which assets are exposed in their current setting

    C. Assigning a value to each information asset

    D. Assessing the relative risk facing the organization's information assets

  • Question 244:

    Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?

    A. Security Administrators

    B. Internal/External Audit

    C. Risk Management

    D. Security Operations

  • Question 245:

    Which of the following is a benefit of a risk-based approach to audit planning?

    A. Resources are allocated to the areas of the highest concern

    B. Scheduling may be performed months in advance

    C. Budgets are more likely to be met by the IT audit staff

    D. Staff will be exposed to a variety of technologies

  • Question 246:

    An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security

    A. Procedural control

    B. Management control

    C. Technical control

    D. Administrative control

  • Question 247:

    You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?

    A. Validate that security awareness program content includes information about the potential vulnerability

    B. Conduct a thorough risk assessment against the current implementation to determine system functions

    C. Determine program ownership to implement compensating controls

    D. Send a report to executive peers and business unit owners detailing your suspicions

  • Question 248:

    An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:

    A. Inform senior management of the risk involved.

    B. Agree to work with the security officer on these shifts as a form of preventative control.

    C. Develop a computer assisted audit technique to detect instances of abuses of the arrangement.

    D. Review the system log for each of the late night shifts to determine whether any irregular actions occurred.

  • Question 249:

    When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

    A. ISO 27001

    B. PRINCE2

    C. ISO 27004

    D. ITILv3

  • Question 250:

    The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?

    A. Number of callers who report security issues.

    B. Number of callers who report a lack of customer service from the call center

    C. Number of successful social engineering attempts on the call center

    D. Number of callers who abandon the call before speaking with a representative

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.