Eccouncil Information Security Manager 512-50 EISM Exam Questions

Page: 1 / 14
Total 404 questions
Question 1

Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?



Answer : C


Question 2

An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:



Answer : A


Question 3

An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?



Answer : D


Question 4

A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program. Which of the following qualifications and experience would be MOST desirable to find in a candidate?



Answer : B


Question 5

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?



Answer : D


Question 6

Security related breaches are assessed and contained through which of the following?



Answer : C


Question 7

The risk found after a control has been fully implemented is called:



Answer : A


Page:    1 / 14   
Total 404 questions