New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

G2700 GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Questions 4

Which of the following states that a user should never be given more privileges than are required to carry out a task?

Options:

A.

Principle of least privilege

B.

Role-based security

C.

Security through obscurity

D.

Segregation of duties

Buy Now
Questions 5

Choose and reorder the appropriate steps that you will take to perform auditing.

Options:

A.

Buy Now
Questions 6

You work as a Security Administrator for uCertify Inc. You need to make a documentation to provide ongoing education and awareness training of disciplinary actions of your company. What are the primary reasons to create this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To ensure that employees understand information security threats

B.

To ensure that employees have the necessary knowledge to mitigate security threats

C.

To ensure that employees are aware of and understand their roles and responsibilities

D.

To ensure that employees have the necessary knowledge about the company's forthcoming Projects

Buy Now
Questions 7

Mark works as a Security Administrator for uCertify Inc. For the last few days, he is getting an error message, i.e., 'Remove the Boot.ini file because it is harmful for operating system'. When Mark reads about the Boot.ini file, he finds that it is a system file that is used to load the operating system on a computer. Which of the following types of virus has attacked Mark's computer?

Options:

A.

Polymorphic

B.

Hoax

C.

Macro

D.

Multipartite

Buy Now
Questions 8

Cigital Risk Management Method was developed by Gary McGraw of Cigital and John Viega of Stonewall Software, and it defines software security risk management process. Choose and re-order the risk management steps that are included in this method.

Options:

A.

Buy Now
Questions 9

The stronger points of CRAMM assist prioritization by providing a countermeasure with high priority if some conditions are met. Which of the following are these conditions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It requires protecting a high risk system.

B.

It does not require the installation of alternative countermeasures.

C.

It is inexpensive to implement.

D.

It provides protection against several threats.

Buy Now
Questions 10

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

Options:

A.

Carry out a risk analysis.

B.

Formulate information security policy.

C.

Set up monitoring.

D.

Carry out an evaluation.

Buy Now
Questions 11

Which of the following statements is correct about the Annual Loss Expectancy?

Options:

A.

It is the size of the damage claims resulting from not having carried out risk analyses effec tively.

B.

It is the average damage calculated by insurance companies for businesses in a country.

C.

It is the minimum amount for which a company should insure itself.

D.

It is the amount of damage that can occur as a result of an incident during the year.

Buy Now
Questions 12

Mark works as a Network Security Administrator for uCertify Inc. An employee of the organization comes to Mark and tells him that a few months ago, the employee had filled an online bank form due to some account related work. Today, when again visiting the site, the employee finds that some of his personal information is still being displayed in the webpage. Which of the following types of cookies should be disabled by Mark to resolve the issue?

Options:

A.

Session

B.

Temporary

C.

Secure

D.

Persistent

Buy Now
Questions 13

Which of the following are the things included by sensitive system isolation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Construction of appropriately isolated environments where technically and operationally feasible

B.

Inclusion of all documents technically stored in a virtual directory

C.

Explicit identification and acceptance of risks when shared facilities and/or resources must be used

D.

Explicit identification and documentation of sensitivity by each system/application controller (owner)

Buy Now
Questions 14

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.

Network Security

B.

Physical security

C.

Access security

D.

Human resource security

Buy Now
Questions 15

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User manuals

B.

Operating systems

C.

Training metarials

D.

Personal data

Buy Now
Questions 16

Which of the following are the two methods that are commonly used for applying mandatory access control?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Lattice-based access control

B.

Attribute-based access control

C.

Rule-based access control

D.

Discretionary access control

Buy Now
Questions 17

Which of the following tasks are performed by Information Security Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is designed to protect information and any equipment that is used in connection with its storage, transmission, and processing.

B.

It is designed to develop information and any equipment that is used in connection with its storage, transmission, and processing.

C.

It is designed to recognize information and any equipment that is used in connection with its storage, transmission, and processing.

D.

It is designed to control information and any equipment that is used in connection with its storage, transmission, and processing.

Buy Now
Questions 18

You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?

Options:

A.

Implement least privileges.

B.

Implement RBAC.

C.

Implement three way authentication.

D.

Implement separation of duties.

Buy Now
Questions 19

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-docheck- act)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It manages resources that are required to achieve a goal.

B.

It determines controls and their objectives.

C.

It performs security awareness training.

D.

It detects and responds to incidents properly.

E.

It operates the selected controls.

Buy Now
Questions 20

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the classification of information assets. Which of the following controls of the ISO standard provides guidelines on the classification of information?

Options:

A.

Control A.7.1.3

B.

Control A.7.1.2

C.

Control A.7.2

D.

Control A.7.2.1

Buy Now
Questions 21

A honey pot is a computer trap that is used to attract potential intruders or attackers. Which of the following are some advantages of honey pots?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk of takeover

B.

Limited view

C.

Small set of data

D.

Reduced false positives

Buy Now
Questions 22

You work as a Security Administrator for uCertify Inc. You have developed a user manual for internal use, which will help your colleagues to work efficiently in the organization. However, you are concerned about the possibility of the user manual being distributed to the public. Therefore, you have decided to implement a system of classification so that you can secure information. Which of the following information classification levels will you use to implement the system?

Options:

A.

Classified

B.

Public or unclassified

C.

Department specific

D.

Private or confidential

Buy Now
Questions 23

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

Options:

A.

System state data

B.

Users manual

C.

DNS record

D.

Cache memory

Buy Now
Questions 24

Service Level Agreement (SLA) provides one service for all customers of that service. Which of the following are the contents included by SLAs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Scope

B.

Mutual responsibilities

C.

Vocations

D.

Service description

Buy Now
Questions 25

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the slowest method for taking a data backup.

B.

It is the fastest method of backing up data.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Buy Now
Questions 26

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Running applications back online

B.

Recovering data

C.

Fault detection

D.

Sales estimation

Buy Now
Questions 27

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Utility model

B.

Cookie

C.

Trade secret

D.

Copyright

Buy Now
Questions 28

As an attacker, you are sending very small sized packets with durations of 15 minutes per packet to the IIS Web server. Since an IIS session remains alive for a long time, the IDS may be tricked into accepting them as regular packet transformations. Which of the following types of attacking methods are you using?

Options:

A.

Session splicing

B.

Nonblind spoofing

C.

Session hijacking

D.

Security Logging

Buy Now
Questions 29

Mark works as a Network Security Administrator for uCertify Inc. He has installed IDS for matching incoming packets against known attacks. Which of the following types of intrusion detection techniques is being used?

Options:

A.

Host-based IDS

B.

Signature-based IDS

C.

Pattern Matching IDS

D.

Network-based IDS

Buy Now
Questions 30

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk transfer

B.

Risk mitigation

C.

Risk avoidance

D.

Risk acceptance

Buy Now
Questions 31

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response?

Options:

A.

Risk owner

B.

Project sponsor

C.

Diane

D.

Subject matter expert

Buy Now
Questions 32

You work as a System Administrator for uCertify Inc. You have been given the task to create a new corporate policy. Which of the following approaches must be followed to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strategic approach

B.

Approach to Risk Management

C.

Clear and unambiguous approach

D.

Industry best practice

Buy Now
Questions 33

Which of the following is used to hide the existence of a message from a third party?

Options:

A.

Steganography

B.

SNORT

C.

Packet sniffing

D.

Spoofing

Buy Now
Questions 34

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Personal security

B.

Network Security

C.

Physical security

D.

Human resource security

Buy Now
Questions 35

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Text Semagrams

B.

Technical steganography

C.

Linguistic steganography

D.

Perceptual masking

Buy Now
Questions 36

Which of the following is NOT a common information-gathering technique while performing risk analysis?

Options:

A.

Review of existing policy documents

B.

Employment of automated risk assessment tools

C.

Distribution of questionnaire

D.

Interview of terminated employees

Buy Now
Questions 37

You work as a CRO for uCertify Inc. You and your team are involved in the pre-assessment phase of the risk governance framework. One of your newly joined team member wants to know the steps involved in the pre-assessment phase. Choose and reorder the steps performed in the pre-assessment phase.

Options:

A.

Buy Now
Questions 38

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cost of lost income from missed sales

B.

Sales aspect of the business

C.

Cost of low productivity

D.

Innovations in electronic funds transfer

Buy Now
Questions 39

You work as a Security Administrator for uCertify Inc. You have developed a user manual for internal use, which will help your colleagues to work efficiently in the organization. However, you are concerned about the possibility of the user manual being distributed to the public. Therefore, you have decided to implement a system of classification so that you can secure information.

Which of the following information classification levels will you use to implement the system?

Options:

A.

Department specific

B.

Public or unclassified

C.

Private or confidential

D.

Classified

Buy Now
Questions 40

In which year was the Turnbull report published?

Options:

A.

2005

B.

2000

C.

1999

D.

1992

Buy Now
Questions 41

Which of the following tasks are accomplished in the Act phase of the PDCA cycle?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The improvements to ISMS are identified.

B.

The improvements to ISMS are implemented.

C.

The improvements to ISMS are developed.

D.

The improvements to ISMS are documented.

Buy Now
Questions 42

How many modules are there in FaultTree+?

Options:

A.

6

B.

5

C.

3

D.

4

Buy Now
Questions 43

Which of the following are security design principles required for information protection?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Closed design

B.

Least privilege

C.

Separation of duties

D.

Complete meditation

Buy Now
Questions 44

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

Options:

A.

Business Continuity Planning

B.

Change Management

C.

Social engineering

D.

Configuration Management

Buy Now
Questions 45

You work as an HR Manager for uCertify Inc. You are working on a checklist to develop an orderly exit process for the employees leaving your company. Which of the following actions should be included in that checklist?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To ensure that assets return in an expedited time frame

B.

To ensure that employees' access is removed

C.

To validate the references and the level of background checks

D.

To ensure that employees understand information security threats

Buy Now
Questions 46

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Clicking on a deceptive pop-up window

B.

Updating windows files automatically

C.

Visiting a website

D.

Viewing an e-mail message

Buy Now
Questions 47

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You are making the documentation on control A.7.2. Which of the following are the main objectives of control A.7.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using

B.

Identifying

C.

Sharing

D.

Restricting

Buy Now
Questions 48

Which of the following specifies value of each asset?

Options:

A.

Asset importance

B.

Asset protection

C.

Asset responsibility

D.

Asset identification

Buy Now
Questions 49

Which of the following refers to the process of adjusting the capacity of a company to meet the changed or predicted demands?

Options:

A.

Business continuity planning

B.

Capacity planning

C.

DR planning

D.

ER planning

Buy Now
Questions 50

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

Options:

A.

ALE=asset value ($)*exposure factor (EF)

B.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

C.

ALE=asset value ($)/exposure factor (EF)

D.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

Buy Now
Questions 51

Sam is one of the four network administrators in Blue Well Inc. They have been assigned together the task to implement PDCA on the project. Sam has to work on the Plan stage of the project. Which of the following tasks should be performed by Sam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Preparing a statement of applicability

B.

Defining the scope of ISMS

C.

Defining the information security policy

D.

Managing operations and resources

Buy Now
Questions 52

You work as a Security Administrator for uCertify Inc. You are concerned about the password security. Therefore, you have decided to apply a policy that will be helpful for others to create strong passwords. Which of the following are the important things that should be remembered to create a strong password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It should contain at least one number or punctuation character.

B.

It should contain at least one capital letter.

C.

It should be a known word.

D.

It should be of eight characters.

Buy Now
Questions 53

Choose and re-order the activities that are performed by the 'Plan' cycle component of PDCA (plan-docheck- act).

Options:

A.

Buy Now
Questions 54

Which of the following identifies a company's exposure to threats and provides effective prevention and recovery for the company?

Options:

A.

Business Delegate

B.

Business impact assessment

C.

Business continuity planning

D.

Business intelligence

Buy Now
Questions 55

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:

A.

Explicit Deny

B.

Implicit Allow

C.

ACL

D.

The principle of least privileges

Buy Now
Questions 56

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:

A.

Take a full backup daily with the previous night's tape taken offsite.

B.

Take a full backup on alternate days and keep rotating the tapes.

C.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

D.

Take a full backup daily and use six-tape rotation.

E.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

F.

Take a full backup daily with one tape taken offsite weekly.

Buy Now
Questions 57

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:

A.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

D.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

Buy Now
Questions 58

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Snow

B.

Blindside

C.

ImageHide

D.

Stealth

Buy Now
Questions 59

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$72,650

B.

$67,250

C.

$68,250

D.

$92,600

Buy Now
Questions 60

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It depends on the physical aspects of the organization.

B.

It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

C.

It depends on the cultural aspects.

D.

It depends on the infrastructure aspects of the organization.

Buy Now
Questions 61

Which of the following utilize information system in order to recognize, control, and protect information or any equipment used?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Storage

B.

Processing

C.

Development

D.

Transmission

Buy Now
Questions 62

You work as a Security Administrator for uCertify Inc. You have been assigned a task for helping employees in determining appropriate technical security measures available for electronic information that is deemed sensitive. Which of the following policies will you apply to accomplish the task?

Options:

A.

Default policy

B.

Information security policy

C.

Security policy

D.

Enterprise policy

Buy Now
Questions 63

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

The options are identified and evaluated for the treatment of the risks.

B.

Training and awareness programs for affected staff are scheduled.

C.

The risk treatment plan is implemented and controls are planned.

D.

Operations and resources are managed.

Buy Now
Questions 64

Which of the following are the activities of Incident Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Incident closure

B.

Incident detection and recording

C.

Classification and initial support

D.

Investigation and diagnosis

Buy Now
Questions 65

Which of the following defines the interdependent relationships among the internal support groups of an organization working to support a Service Level Agreement?

Options:

A.

Two-way Connection Agreement

B.

System Security Authorization Agreement

C.

Operational Level Agreement

D.

Non Disclosure Agreement

Buy Now
Questions 66

David works as the Network Administrator for Blue Well Inc. One of his tasks is to develop and maintain risk management plan. Which of the following are the objectives of risk management plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Eliminating risks

B.

Accepting risks cautiously that cannot be eliminated

C.

Developing required risks

D.

Transferring risks by insurance

Buy Now
Questions 67

Which of the following standards was concerned with corporate governance and directors' remuneration and issued in 1998?

Options:

A.

ISO 27001

B.

Combined Code

C.

Turnbull Report

D.

Sarbanes-Oxley Act

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Dec 22, 2024
Questions: 453

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99