Eccouncil Information Security Manager 512-50 EISM Exam Practice Test

Page: 1 / 14
Total 404 questions
Question 1

Which of the following statements about Encapsulating Security Payload (ESP) is true?



Answer : A


Question 2

Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.

What is one proven method to account for common elements found within separate regulations and/or standards?



Answer : D


Question 3

A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization's large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?



Answer : A


Question 4

As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?



Answer : D


Question 5

A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?



Answer : D


Question 6

With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:



Answer : C


Topic 2, Information Security Controls and Audit Management

Question 7

Creating a secondary authentication process for network access would be an example of?



Answer : A


Page:    1 / 14   
Total 404 questions