Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC G2700 Practice Exam with Questions & Answers | Set: 7

Questions 61

Mark works as a Security Administrator for uCertify Inc. For the last few days, he is getting an error message, i.e., 'Remove the Boot.ini file because it is harmful for operating system'. When Mark reads about the Boot.ini file, he finds that it is a system file that is used to load the operating system on a computer. Which of the following types of virus has attacked Mark's computer?

Options:
A.

Polymorphic

B.

Hoax

C.

Macro

D.

Multipartite

GIAC G2700 Premium Access
Questions 62

Which of the following states that a user should never be given more privileges than are required to carry out a task?

Options:
A.

Principle of least privilege

B.

Role-based security

C.

Security through obscurity

D.

Segregation of duties

Questions 63

Which of the following is the element used in the technology of encrypting and decrypting the text in cryptography?

Options:
A.

Cipher

B.

Key

C.

Plaintext

D.

Encryption

Questions 64

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

Options:
A.

Risk transference

B.

Risk avoidance

C.

Risk acceptance

D.

Risk mitigation

Questions 65

Which of the following is one of the mechanisms available for administrators to employ for replicating the databases containing the DNS data across a set of DNS servers?

Options:
A.

DNS zone transfer

B.

DNS cache poisoning

C.

DNS spoofing

D.

ARP spoofing

Questions 66

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

A protocol analyzer can identify physical layer errors in a network switch.

B.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

C.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Questions 67

Which of the following phases of the PDCA model is the monitoring and controlling phase of the Information Security Management System (ISMS)?

Options:
A.

Check

B.

Plan

C.

Do

D.

Act

Questions 68

Which of the following are the things included by sensitive system isolation?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Construction of appropriately isolated environments where technically and operationally feasible

B.

Inclusion of all documents technically stored in a virtual directory

C.

Explicit identification and acceptance of risks when shared facilities and/or resources must be used

D.

Explicit identification and documentation of sensitivity by each system/application controller (owner)

Questions 69

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Operations and resources are managed.

B.

Training and awareness programs for affected staff are scheduled.

C.

The risk treatment plan is implemented and controls are planned.

D.

The options are identified and evaluated for the treatment of the risks.

Questions 70

You work as a System Administrator for uCertify Inc. You have been given the task to create a new corporate policy. Which of the following approaches must be followed to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Strategic approach

B.

Approach to Risk Management

C.

Clear and unambiguous approach

D.

Industry best practice

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.