Eccouncil Information Security Manager 512-50 EISM Exam Questions

Page: 1 / 14
Total 404 questions
Question 1

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?



Answer : B


Question 2

Which of the following represents the BEST method of ensuring security program alignment to business needs?



Answer : B


Question 3

Simon had all his systems administrators implement hardware and software firewalls to ensure network

security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized

traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker

group was able to get into the network and modify files hosted on the company's website. After searching

through the firewall and server logs, no one could find how the attackers were able to get in. He decides that

the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts

administrators when a critical file is altered. What tool could Simon and his administrators implement to

accomplish this?



Answer : C


Question 4

A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?



Answer : C


Question 5

The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?



Answer : B


Question 6

Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.

When multiple regulations or standards apply to your industry you should set controls to meet the:



Answer : C


Question 7

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his

assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for

an employee to pass through the main access gate, then the consultant follows the employee behind to get into

the restricted are

a. Which type of attack did the consultant perform?



Answer : B


Page:    1 / 14   
Total 404 questions