EC-Council 512-50 Exam Questions
Information Security Manager (Page 15 )

Updated On: 17-Feb-2026

According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?

  1. Identify threats, risks, impacts and vulnerabilities
  2. Decide how to manage risk
  3. Define the budget of the Information Security Management System
  4. Define Information Security Policy

Answer(s): D



You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

  1. Chief Information Security Officer
  2. Chief Executive Officer
  3. Chief Information Officer
  4. Chief Legal Counsel

Answer(s): B



The success of the Chief Information Security Officer is MOST dependent upon:

  1. favorable audit findings
  2. following the recommendations of consultants and contractors
  3. development of relationships with organization executives
  4. raising awareness of security issues with end users

Answer(s): C



An organization information security policy serves to

  1. establish budgetary input in order to meet compliance requirements
  2. establish acceptable systems and user behavior
  3. define security configurations for systems
  4. define relationships with external law enforcement agencies

Answer(s): B



Information security policies should be reviewed:

  1. by stakeholders at least annually
  2. by the CISO when new systems are brought online
  3. by the Incident Response team after an audit
  4. by internal audit semiannually

Answer(s): A






Post your Comments and Discuss EC-Council 512-50 exam dumps with other Community members:

Join the 512-50 Discussion