Free 512-50 Exam Braindumps (page: 18)

Page 17 of 102

What two methods are used to assess risk impact?

  1. Cost and annual rate of expectance
  2. Subjective and Objective
  3. Qualitative and percent of loss realized
  4. Quantitative and qualitative

Answer(s): D



According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?

  1. Identify threats, risks, impacts and vulnerabilities
  2. Decide how to manage risk
  3. Define the budget of the Information Security Management System
  4. Define Information Security Policy

Answer(s): D



You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

  1. Chief Information Security Officer
  2. Chief Executive Officer
  3. Chief Information Officer
  4. Chief Legal Counsel

Answer(s): B



The success of the Chief Information Security Officer is MOST dependent upon:

  1. favorable audit findings
  2. following the recommendations of consultants and contractors
  3. development of relationships with organization executives
  4. raising awareness of security issues with end users

Answer(s): C






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts