Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 11

Questions 101

Which of the following paragraphs of the Turnbull Guidance provide clear description of the principles of a risk treatment plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

16

B.

18

C.

17

D.

19

GIAC G2700 Premium Access
Questions 102

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

Options:
A.

Configuration Management

B.

Business Continuity Planning

C.

Social engineering

D.

Change Management

Questions 103

An employee of your company has stolen some files and records. Which of the following security standards is concerned with this event?

Options:
A.

Business security

B.

Human right security

C.

Human security

D.

Human resource security

Questions 104

Which of the following types of viruses is placed into the first sector of the hard drive?

Options:
A.

Multipartite

B.

Master boot record

C.

File

D.

Boot sector

Questions 105

You work as a Security Administrator for uCertify Inc. You found that a person is coming inside the working area. Now, you want to ensure the authenticity of that person. By which of the following factors can you determine the accuracy of the authentication?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Two-factor authentication

B.

Three-factor authentication

C.

Many-factor authentication

D.

One-factor authentication

Questions 106

Which of the following statements is related to residual risks?

Options:
A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is the probabilistic risk before implementing all security measures.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk after implementing all security measures.

Questions 107

Which of the following phases of the PDCA model is the controlling and maintaining phase of the Information Security Management System (ISMS)?

Options:
A.

Check

B.

Act

C.

Do

D.

Plan

Questions 108

Which of the following are the various types of security measures?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Reductive

B.

Preventive

C.

Quantitative

D.

Qualitative

Questions 109

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

Options:
A.

Attribute-based access control

B.

Rule-based access control

C.

Discretionary access control

D.

Mandatory access control

Questions 110

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:
A.

Downtime

B.

Uptime

C.

Slowtime

D.

Peaktime

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.