Eccouncil 512-50 Information Security Manager EISM Exam Practice Test

Page: 1 / 14
Total 404 questions
Question 1

As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with

third parties outside the organization. What protocol provides the ability to extend the network perimeter with

the use of encapsulation and encryption?



Answer : D


Question 2

At what level of governance are individual projects monitored and managed?



Answer : D


Question 3

Which of the following is true regarding expenditures?



Answer : D


Question 4

Simon had all his systems administrators implement hardware and software firewalls to ensure network

security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized

traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker

group was able to get into the network and modify files hosted on the company's website. After searching

through the firewall and server logs, no one could find how the attackers were able to get in. He decides that

the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts

administrators when a critical file is altered. What tool could Simon and his administrators implement to

accomplish this?



Answer : C


Question 5

An organization has a number of Local Area Networks (LANs) linked to form a single Wide Area Network

(WAN). Which of the following would BEST ensure network continuity?



Answer : C


Question 6

Which of the following is a primary method of applying consistent configurations to IT systems?



Answer : C


Question 7

Which of the following is the MOST logical method of deploying security controls within an organization?



Answer : B


Page:    1 / 14   
Total 404 questions