Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers

Questions 1

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to list down all procedures included in control A.7.2.2 of the ISO standard. Which of the following procedures are included in control A.7.2.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Storage

B.

Encryption

C.

Destruction

D.

Acquisition of information

GIAC G2700 Premium Access
Questions 2

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

Options:
A.

ALE=asset value ($)/exposure factor (EF)

B.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

C.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

D.

ALE=asset value ($)*exposure factor (EF)

Questions 3

Choose and re-order the activities that are performed by the 'Plan' cycle component of PDCA (plan-docheck- act).

G2700 Question 3

Options:
A.

Questions 4

What is the order of the steps in the incident cycle?

Options:
A.

Incident, Threat, Damage, Recovery

B.

Incident, Recovery, Damage, Threat

C.

Threat, Damage, Incident, Recovery

D.

Threat, Incident, Damage, Recovery

Questions 5

Which of the following are the goals of cryptography?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Authentication

B.

Authorization

C.

Data integrity

D.

Confidentiality

Questions 6

Which of the following is a technique for a threat, which creates changes to the project management plan?

Options:
A.

Risk transference

B.

Risk avoidance

C.

Risk mitigation

D.

Risk acceptance

Questions 7

Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical computer systems that are necessary to support business continuity. All these tiers provide a simple method to define current service levels and associated risks. Choose and re-order the tiers of disaster recovery plan.

G2700 Question 7

Options:
A.

Questions 8

Which of the following provides high availability of data?

Options:
A.

Anti-virus software

B.

RAID

C.

EFS

D.

Backup

Questions 9

Mark works as a Network Security Administrator for uCertify Inc. He has installed IDS for matching incoming packets against known attacks. Which of the following types of intrusion detection techniques is being used?

Options:
A.

Host-based IDS

B.

Pattern Matching IDS

C.

Network-based IDS

D.

Signature-based IDS

Questions 10

You are setting up file permissions on a Windows server. Different users have different access needs. What should be your guiding principal in assigning file permissions?

Options:
A.

Make three groups (one with low access, 1 moderate, and 1 high) and fit everyone into one of these groups.

B.

Give users the minimal access required for their job, as this is more secure.

C.

Give everyone access, as this makes administration simpler.

D.

Block access to files until a user specifically requests any.

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.