Eccouncil 512-50 Information Security Manager EISM Exam Practice Test

Page: 1 / 14
Total 404 questions
Question 1

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?



Answer : B


Question 2

As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with

third parties outside the organization. What protocol provides the ability to extend the network perimeter with

the use of encapsulation and encryption?



Answer : D


Question 3

Which of the following best describes the sensors designed to project and detect a light beam across an area?



Answer : D


Question 4

Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the

following best describes the problem he has encountered?



Answer : B


Question 5

As the Chief Information Security Officer, you are performing an assessment of security posture to understand

what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows

to detect and actively stop vulnerability exploits and attacks?



Answer : B


Question 6

An organization has a number of Local Area Networks (LANs) linked to form a single Wide Area Network

(WAN). Which of the following would BEST ensure network continuity?



Answer : C


Question 7

What is meant by password aging?



Answer : C


Page:    1 / 14   
Total 404 questions