ECCouncil 512-50 - EC-Council Information Security Manager (E|ISM)
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
Which of the following are not stakeholders of IT security projects?
Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?
A recommended method to document the respective roles of groups and individuals for a given process is to:
Which of the following is the BEST indicator of a successful project?
Which of the following information may be found in table top exercises for incident response?
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?