ECCouncil 512-50 - EC-Council Information Security Manager (E|ISM)
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
An organization is looking for a framework to measure the efficiency and effectiveness of their Information Security Management System. Which of the following international standards can BEST assist this organization?
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
The exposure factor of a threat to your organization is defined by?
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
What is the relationship between information protection and regulatory compliance?
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?