512-50試験無料問題集「EC-COUNCIL EC-Council Information Security Manager (E|ISM) 認定」

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

Annual Loss Expectancy is derived from the function of which two factors?

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?

Scenario: The new CISO was informed of all the Information Security projects that the section has in progress.
Two projects are over a year behind schedule and way over budget.
Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?

解説: (GoShiken メンバーにのみ表示されます)
When creating contractual agreements and procurement processes why should security requirements be included?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following BEST describes an international standard framework that is based on the security model Information Technology-Code of Practice for Information Security Management?

When updating the security strategic planning document what two items must be included?

Scenario: Your company has many encrypted telecommunications links for their world-wide operations.
Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
Symmetric encryption in general is preferable to asymmetric encryption when:

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?

A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

Dataflow diagrams are used by IT auditors to:

Control Objectives for Information and Related Technology (COBIT) is which of the following?

An audit was conducted and many critical applications were found to have no disaster recovery plans in place.
You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application.
What should be the NEXT step?

A newly-hired CISO needs to understand the organization's financial management standards for business units and operations. Which of the following would be the best source of this information?

Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When formulating the remediation plan, what is a required input?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?

Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network.
Which is the single most important factor to introducing digital evidence into a court of law?

What is the first thing that needs to be completed in order to create a security program for your organization?

What is meant by password aging?

解説: (GoShiken メンバーにのみ表示されます)