512-50試験無料問題集「EC-COUNCIL EC-Council Information Security Manager (E|ISM) 認定」

Acceptable levels of information security risk tolerance in an organization should be determined by?

The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong?
(choose the BEST answer):

While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?

To get an Information Security project back on schedule, which of the following will provide the MOST help?

Which of the following activities is the MAIN purpose of the risk assessment process?

The Information Security Management program MUST protect:

Risk that remains after risk mitigation is known as

A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?

During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her annual budget. What is the condition of her current budgetary posture?

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

Which of the following is critical in creating a security program aligned with an organization's goals?

If a Virtual Machine's (VM) data is being replicated and that data is corrupted, this corruption will automatically be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?

解説: (GoShiken メンバーにのみ表示されます)
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?

Which of the following is an accurate description of a balance sheet?

A recommended method to document the respective roles of groups and individuals for a given process is to:

A missing/ineffective security control is identified. Which of the following should be the NEXT step?

Which of the following is the MOST important component of any change management process?