Exam Details

  • Exam Code
    :512-50
  • Exam Name
    :EC-Council Information Security Manager (E|ISM)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :404 Q&As
  • Last Updated
    :Apr 16, 2025

EC-COUNCIL EC-COUNCIL Certifications 512-50 Questions & Answers

  • Question 291:

    What is the main purpose of the Incident Response Team?

    A. Ensure efficient recovery and reinstate repaired systems

    B. Create effective policies detailing program activities

    C. Communicate details of information security incidents

    D. Provide current employee awareness programs

  • Question 292:

    Information security policies should be reviewed:

    A. by stakeholders at least annually

    B. by the CISO when new systems are brought online

    C. by the Incident Response team after an audit

    D. by internal audit semiannually

  • Question 293:

    An organization is looking for a framework to measure the efficiency and effectiveness of their Information Security Management System. Which of the following international standards can BEST assist this organization?

    A. International Organization for Standardizations ?27004 (ISO-27004)

    B. Payment Card Industry Data Security Standards (PCI-DSS)

    C. Control Objectives for Information Technology (COBIT)

    D. International Organization for Standardizations ?27005 (ISO-27005)

  • Question 294:

    Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?

    A. Use within an organization to formulate security requirements and objectives

    B. Implementation of business-enabling information security

    C. Use within an organization to ensure compliance with laws and regulations

    D. To enable organizations that adopt it to obtain certifications

  • Question 295:

    Which represents PROPER separation of duties in the corporate environment?

    A. Information Security and Identity Access Management teams perform two distinct functions

    B. Developers and Network teams both have admin rights on servers

    C. Finance has access to Human Resources data

    D. Information Security and Network teams perform two distinct functions

  • Question 296:

    As a new CISO at a large healthcare company you are told that everyone has to badge in to get in the building. Below your office window you notice a door that is normally propped open during the day for groups of people to take breaks outside. Upon looking closer you see there is no badge reader. What should you do?

    A. Nothing, this falls outside your area of influence.

    B. Close and chain the door shut and send a company-wide memo banning the practice.

    C. Have a risk assessment performed.

    D. Post a guard at the door to maintain physical security

  • Question 297:

    Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?

    A. Servers, routers, switches, modem

    B. Firewall, exchange, web server, intrusion detection system (IDS)

    C. Firewall, anti-virus console, IDS, syslog

    D. IDS, syslog, router, switches

  • Question 298:

    A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?

    A. The auditors have not followed proper auditing processes

    B. The CIO of the organization disagrees with the finding

    C. The risk tolerance of the organization permits this risk

    D. The organization has purchased cyber insurance

  • Question 299:

    The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?

    A. Risk metrics

    B. Management metrics

    C. Operational metrics

    D. Compliance metrics

  • Question 300:

    The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization's

    A. Risk Management Program.

    B. Anti-Spam controls.

    C. Security Awareness Program.

    D. Identity and Access Management Program.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 512-50 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.