We at Crack4sure are committed to giving students who are preparing for the ECCouncil 512-50 Exam the most current and reliable questions . To help people study, we've made some of our EC-Council Information Security Manager (E|ISM) exam materials available for free to everyone. You can take the Free 512-50 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to
The exposure factor of a threat to your organization is defined by?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
You have implemented the new controls. What is the next step?
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
The risk found after a control has been fully implemented is called:
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
Who in the organization determines access to information?
Which of the following are necessary to formulate responses to external audit findings?
Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?
Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
Which of the following provides an audit framework?
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Which of the following industry / sector neutral information security control frameworks should you recommend for implementation?
Annual Loss Expectancy is derived from the function of which two factors?
Acceptable levels of information security risk tolerance in an organization should be determined by?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
What phase of the response provides measures to reduce the likelihood of an incident from recurring?
Involvement of senior management is MOST important in the development of:
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
File Integrity Monitoring (FIM) is considered a
Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the
following best describes the problem he has encountered?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?
What is the BEST reason for having a formal request for proposal process?
When updating the security strategic planning document what two items must be included?
Which of the following best describes the sensors designed to project and detect a light beam across an area?
Which of the following would negatively impact a log analysis of a multinational organization?
Which of the following is true regarding expenditures?
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?
IT control objectives are useful to IT auditors as they provide the basis for understanding the:
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture. What would be the BEST choice of security metrics to present to the BOD?
How often should an environment be monitored for cyber threats, risks, and exposures?
When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?
Which of the following activities must be completed BEFORE you can calculate risk?
Which of the following BEST describes an international standard framework that is based on the security model Information Technology—Code of Practice for Information Security Management?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
Creating a secondary authentication process for network access would be an example of?
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?
A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?
Regulatory requirements typically force organizations to implement
What is the MAIN reason for conflicts between Information Technology and Information Security programs?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
The PRIMARY objective for information security program development should be:
What is a difference from the list below between quantitative and qualitative Risk Assessment?
What is the BEST way to achieve on-going compliance monitoring in an organization?
An organization's Information Security Policy is of MOST importance because
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
A method to transfer risk is to:
The Information Security Management program MUST protect:
Physical security measures typically include which of the following components?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
Which wireless encryption technology makes use of temporal keys?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
An anonymity network is a series of?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
Which of the following is a symmetric encryption algorithm?
What is the FIRST step in developing the vulnerability management program?
What type of attack requires the least amount of technical equipment and has the highest success rate?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
The process of identifying and classifying assets is typically included in the
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
Which of the following strategies provides the BEST response to a ransomware attack?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
What oversight should the information security team have in the change management process for application security?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
A stakeholder is a person or group:
A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
When is an application security development project complete?
You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?
Risk appetite is typically determined by which of the following organizational functions?
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
Which of the following is the BEST indicator of a successful project?
Which of the following can the company implement in order to avoid this type of security issue in the future?
Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
Which of the following is critical in creating a security program aligned with an organization’s goals?
The ultimate goal of an IT security projects is:
An example of professional unethical behavior is:
Which of the following represents the BEST method of ensuring security program alignment to business needs?
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?
To get an Information Security project back on schedule, which of the following will provide the MOST help?
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correctly aligns with the company goals and the scope of the project is correct. What is the NEXT step?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
From an Information Security Leadership perspective, which of the following is a MAJOR concern about the CISO’s approach to security?
The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals
the increasing need to address security consistently at the enterprise level. This new CISO, while confident with
skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
From an Information Security Leadership perspective, which of the following is a MAJOR concern about the
CISO’s approach to security?
3 Months Free Update
3 Months Free Update
3 Months Free Update