Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 2

Questions 11

Mark works as a security manager for SoftTech Inc. He is performing a security awareness program. To be successful in performing the awareness program, he should take into account the needs and current levels of training and understanding of the employees and audience. There are five key ways, which Mark should keep in mind while performing this activity:

l Current level of computer usage

l What the audience really wants to learn

l How receptive the audience is to the security program

l How to gain acceptance

l Who might be a possible ally

Which of the following activities is performed in this security awareness process?

Options:
A.

Audience segmentation

B.

Audience participation

C.

Separation of duties

D.

Stunned owl syndrome

GIAC G2700 Premium Access
Questions 12

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:
A.

ACL

B.

Explicit Deny

C.

The principle of least privileges

D.

Implicit Allow

Questions 13

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:
A.

Explicit Deny

B.

Implicit Allow

C.

ACL

D.

The principle of least privileges

Questions 14

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share organization's personal requirements regarding the tool to the third party using a non disclosure agreement (NDA). Which of the following is the purpose of using NDA?

Options:
A.

To ensure that the third-party organization respects the security of information to be share d

B.

To be used as an acknowledgement

C.

To ensure the protection of intellectual copyright of information

D.

To be used as a legal disclaimer

Questions 15

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:
A.

Reverse social engineering attack

B.

Impersonation attack

C.

Important user posing attack

D.

In person attack

Questions 16

David works as the Network Administrator for Blue Well Inc. One of his tasks is to develop and maintain risk management plan. Which of the following are the objectives of risk management plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Eliminating risks

B.

Accepting risks cautiously that cannot be eliminated

C.

Developing required risks

D.

Transferring risks by insurance

Questions 17

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following elements are included in ISMS?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Implement

B.

Plan

C.

Evaluation

D.

Encrypt

Questions 18

Which of the following defines the interdependent relationships among the internal support groups of an organization working to support a Service Level Agreement?

Options:
A.

Two-way Connection Agreement

B.

System Security Authorization Agreement

C.

Operational Level Agreement

D.

Non Disclosure Agreement

Questions 19

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

Options:
A.

Sharpen

B.

Soften

C.

Blur

D.

Rotate

Questions 20

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:
A.

Access security

B.

Physical security

C.

Human resource security

D.

Network Security

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.