Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 3

Questions 21

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Hybrid attack

B.

Rule based attack

C.

Brute Force attack

D.

Dictionary attack

GIAC G2700 Premium Access
Questions 22

Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

Options:
A.

Supply chain management

B.

Inventory management

C.

Information security management

D.

Change management

Questions 23

Which of the following security design principles supports comprehensive and simple design and implementation of protection mechanisms, so that an unintended access path does not exist or can be readily identified and eliminated?

Options:
A.

Psychological acceptability

B.

Separation of duties

C.

Economy of mechanism

D.

Least privilege

Questions 24

You work as the Network Security Administrator for uCertify Inc. The organization is using an intranet to distribute information to its employees. A database residing on the network contains employees' information, such as employee name, designation, department, phone extension, date of birth, date of joining, etc. You are concerned about the security because the database has all information about employees, which can help an unauthorized person to recognize an individual. Which Personally Identifiable Information should be removed from the database so that the unauthorized person cannot identify an individual?

Options:
A.

Date of birth

B.

Employee name

C.

Employee code

D.

Date of joining

Questions 25

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

The options are identified and evaluated for the treatment of the risks.

B.

Training and awareness programs for affected staff are scheduled.

C.

The risk treatment plan is implemented and controls are planned.

D.

Operations and resources are managed.

Questions 26

David has identified a technical risk in his project and has been assigned a contingency for that. Which part of the risk response strategy does planning contingency reserves come under?

Options:
A.

Active risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Passive risk acceptance

Questions 27

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. You need to audit the network of the company. You need to plan the audit process to minimize the audit risk.

What steps will you take to minimize the possibility of audit risk?

G2700 Question 27

Options:
A.

Questions 28

Which of the following is the correct formula of annualized loss expectancy?

Options:
A.

ALE=single loss expectancy*annualized rate of occurrence

B.

ALE= asset value*exposure factor

C.

ALE=single loss expectancy*exposure factor

D.

ALE=asset value*annualized rate of occurrence

Questions 29

Which of the following forms the basis for the assessment of information security management system (ISMS)?

Options:
A.

ISO 9000

B.

ISO 27001

C.

BS7799

D.

ISO 9001

Questions 30

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.1.3. Which of the following is the chief concern of control A.7.1.3?

Options:
A.

Classification of information

B.

Identification of assets

C.

Identification of inventory

D.

Acceptable use of information assets

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.