ECCouncil 512-50 - EC-Council Information Security Manager (E|ISM)
Using the Transport Layer Security (TLS) protocol enables a client in a network to be:
As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Acceptable levels of information security risk tolerance in an organization should be determined by?
Which of the following best describes a portfolio?
As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business,
they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they
will be in the organization. How would you prevent such type of attacks?
Which of the following information would MOST likely be reported at the board-level within an organization?
During the last decade, what trend has caused the MOST serious issues in relation to physical security?