Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
International Council of E-Commerce Consultants (EC-Council)
Exam 3: EC-Council Information Security Manager (E|ISM)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Question 102
Multiple Choice
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
Question 103
Multiple Choice
An example of professional unethical behavior is:
Question 104
Multiple Choice
What oversight should the information security team have in the change management process for application security?
Question 105
Multiple Choice
The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?
Question 106
Multiple Choice
Which of the following is considered one of the most frequent failures in project management?
Question 107
Multiple Choice
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
Question 108
Multiple Choice
You manage a newly created Security Operations Center (SOC) , your team is being inundated with security alerts and don't know what to do. What is the BEST approach to handle this situation?
Question 109
Multiple Choice
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
Question 110
Multiple Choice
How often should the SSAE16 report of your vendors be reviewed?
Question 111
Multiple Choice
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
Question 112
Multiple Choice
In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?
Question 113
Multiple Choice
Which of the following is critical in creating a security program aligned with an organization's goals?
Question 114
Multiple Choice
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
Question 115
Multiple Choice
A recommended method to document the respective roles of groups and individuals for a given process is to:
Question 116
Multiple Choice
When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization. Which example below is the MOST creative way to maintain a strong security posture during these difficult times?
Question 117
Multiple Choice
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?