Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 10

Questions 91

Which of the following are the primary rules defined for RBAC?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Transaction authorization

B.

Role authorization

C.

Role assignment

D.

Transaction assignment

GIAC G2700 Premium Access
Questions 92

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Recovering data

B.

Sales estimation

C.

Running applications back online

D.

Fault detection

Questions 93

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:
A.

Privacy law

B.

Copyright law

C.

Security law

D.

Trademark law

Questions 94

Mark works as a Security Administrator for uCertify Inc. Somehow Mark comes to know that an employee is keeping illegal software on his workstation. After investigating, Mark finds that this is indeed true. Therefore, Mark decides to file a law suit against the organization, as it is against organization's norms to store illegal information. Now, the organization decides to call the police and suspend Mark from work till further internal inquiries. Which of the following practices has been implemented in this scenario?

Options:
A.

Due diligence

B.

Due process

C.

Privacy

D.

Due care

Questions 95

Fill in the blank with an appropriate phrase.

The______ is concerned with rebuilding production processing and determining the criticality of data.

Options:
A.

recovery team

Questions 96

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

Options:
A.

An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

B.

An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

C.

An organization should apply encryption to its information assets.

D.

An organization should implement and maintain IDS to manage risks to the network.

Questions 97

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:
A.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

D.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

Questions 98

Which of the following statements is true about exposure factor?

Options:
A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Questions 99

Fill in the blank with the appropriate term.

______is a prime example of a high-interaction honeypot.

Options:
Questions 100

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:
A.

Packet sniffing

B.

Spoofing

C.

Cryptanalysis

D.

Steganography

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.