ECCouncil 512-50 - EC-Council Information Security Manager (E|ISM)
Which of the following intellectual Property components is focused on maintaining brand recognition?
When choosing a risk mitigation method what is the MOST important factor?
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
Credit card information, medical data, and government records are all examples of:
A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program. Which of the following qualifications and experience would be MOST desirable to find in a candidate?
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for
Regulatory requirements typically force organizations to implement
When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
One of the MAIN goals of a Business Continuity Plan is to
A method to transfer risk is to: