EC-Council 512-50 Exam Questions
Information Security Manager (Page 11 )

Updated On: 17-Feb-2026

If your organization operates under a model of "assumption of breach", you should:

  1. Protect all information resource assets equally
  2. Establish active firewall monitoring protocols
  3. Purchase insurance for your compliance liability
  4. Focus your security efforts on high value assets

Answer(s): C



A method to transfer risk is to:

  1. Implement redundancy
  2. move operations to another region
  3. purchase breach insurance
  4. Alignment with business operations

Answer(s): C



You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the

  1. Controlled mitigation effort
  2. Risk impact comparison
  3. Relative likelihood of event
  4. Comparative threat analysis

Answer(s): C



Ensuring that the actions of a set of people, applications and systems follow the organization's rules is BEST described as:

  1. Risk management
  2. Security management
  3. Mitigation management
  4. Compliance management

Answer(s): D



A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?

  1. Audit validation
  2. Physical control testing
  3. Compliance management
  4. Security awareness training

Answer(s): C






Post your Comments and Discuss EC-Council 512-50 exam dumps with other Community members:

Join the 512-50 Discussion