최신 EISM 512-50 무료샘플문제:
1. To get an Information Security project back on schedule, which of the following will provide the MOST help?
A) Upper management support
B) Extend work hours
C) More frequent project milestone meetings
D) Stakeholder support
2. As the Chief Information Security Officer, you are performing an assessment of security posture to understand what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows to detect and actively stop vulnerability exploits and attacks?
A) Gigamon
B) Port Security
C) Anti-virus
D) Intrusion Prevention System
3. Which of the following best describes an access control process that confirms the identity of the entity seeking access to a logical or physical area?
A) Authentication
B) Authorization
C) Accountability
D) Identification
4. Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
A) Risk Management
B) System Testing
C) Vulnerability Assessment
D) Risk Assessment
5. What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
A) Mitigate risk
B) Evaluate risk avoidance criteria
C) Determine appetite
D) Perform a risk assessment
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: D | 질문 # 3 정답: B | 질문 # 4 정답: D | 질문 # 5 정답: A |