Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 13

Questions 121

An audit trail is an example of which of the following types of control?

Options:
A.

Detective control

B.

Application control

C.

Preventive control

D.

Deterrent control

GIAC G2700 Premium Access
Questions 122

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:
A.

Deterrent control

B.

Application control

C.

Preventive control

D.

Detective control

Questions 123

Which of the following is used to govern the disclosure of financial and accounting information?

Options:
A.

Gramm-Leach-Bliley Act

B.

Privacy act of 1974

C.

Sarbanes-Oxley

D.

Health Insurance Portability and Accountability Act

Questions 124

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:
A.

Human resource security

B.

Personal security

C.

Physical security

D.

Network Security

Questions 125

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory?

Options:
A.

Ping of death

B.

Self-modifying code

C.

Heap overflow

D.

Buffer overflow

Questions 126

You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?

Options:
A.

Avoidance

B.

Transference

C.

Mitigation

D.

Acceptance

Questions 127

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?

Options:
A.

Disaster Recovery Plan

B.

Cyber Incident Response Plan

C.

Occupant Emergency Plan

D.

Crisis Communication Plan

Questions 128

You work as a Security Administrator for uCertify Inc. You have been assigned the task to apply a data availability solution based on a striped disk array without redundancy. Which of the following will you use to accomplish the task?

Options:
A.

RAID 3/4

B.

RAID 1

C.

RAID 5

D.

RAID 0

Questions 129

Which of the following is a legal system that gives great precedential weight to common law, on the principle that it is unfair to treat similar facts differently on different occasions?

Options:
A.

Religious law

B.

Common law

C.

Civil law

D.

Customary law

Questions 130

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

Options:
A.

An organization should implement and maintain IDS to manage risks to the network.

B.

An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

C.

An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

D.

An organization should apply encryption to its information assets.

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.