Free 512-50 Exam Braindumps (page: 21)

Page 20 of 102

The Information Security Management program MUST protect:

  1. all organizational assets
  2. critical business processes and /or revenue streams
  3. intellectual property released into the public domain
  4. against distributed denial of service attacks

Answer(s): B



What is the MAIN reason for conflicts between Information Technology and Information Security programs?

  1. Technology governance defines technology policies and standards while security governance does not.
  2. Security governance defines technology best practices and Information Technology governance does not.
  3. Technology Governance is focused on process risks whereas Security Governance is focused on business risk.
  4. The effective implementation of security controls can be viewed as an inhibitor to rapid Information Technology implementations.

Answer(s): D



The Information Security Governance program MUST:

  1. integrate with other organizational governance processes
  2. support user choice for Bring Your Own Device (BYOD)
  3. integrate with other organizational governance processes
  4. show a return on investment for the organization

Answer(s): A



A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization's large IT infrastructure.
What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?

  1. Scan a representative sample of systems
  2. Perform the scans only during off-business hours
  3. Decrease the vulnerabilities within the scan tool settings
  4. Filter the scan output so only pertinent data is analyzed

Answer(s): A






Post your Comments and Discuss EC-Council 512-50 exam with other Community members:

512-50 Discussions & Posts