Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 6

Questions 51

You work as a Network Administrator for uCertify Inc. The organization has constructed a cafeteria for their employees and you are responsible to select the access control method for the cafeteria.

There are a few conditions for giving access to the employees, which are as follows:

1. Top level management can get access any time.

2. Staff members can get access during the specified hours.

3. Guests can get access only in working hours.

Which of the following access control methods is suitable to accomplish the task?

Options:
A.

Discretionary access control

B.

Lattice-based access control

C.

Attribute-based access control

D.

Rule-based access control

GIAC G2700 Premium Access
Questions 52

You work as an Information Security Officer for uCertify Inc. You need to create an asset management plan differentiating fixed assets from inventory items. How will you differentiate assets from inventory items?

Options:
A.

Inventory items are sold.

B.

Assets are temporary usually.

C.

Inventory items are permanent.

D.

Assets cannot be used.

Questions 53

Which of the following are the exceptions of the Data Protection Act?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Section 36 - Domestic purposes

B.

Section 28 - National security

C.

Section 55 - Unlawful obtaining of personal data

D.

Section 29 - Crime and taxation

Questions 54

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to assign ownership of some assets of the organization. Which of the following statements correctly describe the responsibilities of an asset owner?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

The owner has property rights to the asset.

B.

The owner is allowed to delegate responsibility for maintaining the asset.

C.

The owner should have a document describing the security controls for the asset.

D.

The owner is allowed to delegate accountability of the asset.

Questions 55

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:
A.

Mail bombing

B.

Cross site scripting attack

C.

Social engineering attack

D.

Password guessing attack

Questions 56

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:
A.

Network Security

B.

Physical security

C.

Access security

D.

Human resource security

Questions 57

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

It depends on the cultural aspects.

B.

It depends on the infrastructure aspects of the organization.

C.

It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

D.

It depends on the physical aspects of the organization.

Questions 58

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of control A.10.1.1. What is the purpose of control A.10.1.1?

Options:
A.

It is concerned with the documentation of the human resource security to make recruitments clear to the organization.

B.

It is concerned with the documentation of the supply chain management.

C.

It is concerned with the documentation of operating procedures to ensure the correct and secure use of information processing facilities.

D.

It is concerned with the documentation of the disaster recovery management to ensure proper backup technologies.

Questions 59

Which of the following documents is developed along the risk management processes to monitor and control risks?

Options:
A.

Fault tree

B.

Risk mitigation

C.

Decision tree

D.

Risk register

Questions 60

You work as an Information Security Manager for uCertify Inc. You are working on a document regarding the PDCA methodology. Which of the following elements of the PDCA (Plan-Do-Check- Act) methodology is used to continually improve the process performance?

Options:
A.

Act

B.

Check

C.

Do

D.

Plan

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.