EC-Council 512-50 Exam Questions
Information Security Manager (Page 12 )

Updated On: 17-Feb-2026

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected.
Who must be informed of this incident?

  1. Internal audit
  2. The data owner
  3. All executive staff
  4. Government regulators

Answer(s): B



A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program.
Which of the following qualifications and experience would be MOST desirable to find in a candidate?

  1. Multiple certifications, strong technical capabilities and lengthy resume
  2. Industry certifications, technical knowledge and program management skills
  3. College degree, audit capabilities and complex project management
  4. Multiple references, strong background check and industry certifications

Answer(s): B



An organization licenses and uses personal information for business operations, and a server containing that information has been compromised.
What kind of law would require notifying the owner or licensee of this incident?

  1. Data breach disclosure
  2. Consumer right disclosure
  3. Security incident disclosure
  4. Special circumstance disclosure

Answer(s): A



An organization's firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase.
What does this selection indicate?

  1. A high threat environment
  2. A low risk tolerance environment
  3. I low vulnerability environment
  4. A high risk tolerance environment

Answer(s): D



An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied.
What is the NEXT logical step in applying the controls in the organization?

  1. Determine the risk tolerance
  2. Perform an asset classification
  3. Create an architecture gap analysis
  4. Analyze existing controls on systems

Answer(s): B






Post your Comments and Discuss EC-Council 512-50 exam dumps with other Community members:

Join the 512-50 Discussion