Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 10 out of 14 pages
Viewing questions 91-100 out of questions
Questions # 91:

Which of the following are the various types of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Corrective

B.

Quantitative

C.

Repressive

D.

Qualitative

Questions # 92:

Fill in the blank with an appropriate phrase.

_________accord describes the minimum regulatory capital to be allocated by each bank based on its risk profile of assets.

Options:

Questions # 93:

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A protocol analyzer can identify physical layer errors in a network switch.

B.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

C.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Questions # 94:

You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.

Which of the following are the main objectives of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Minimal disruption of services

B.

Reduction of inventory in accordance with revenue

C.

Economic utilization of resources involved in the change

D.

Reduction in back-out activities

Questions # 95:

Which of the following is the element used in the technology of encrypting and decrypting the text in cryptography?

Options:

A.

Cipher

B.

Key

C.

Plaintext

D.

Encryption

Questions # 96:

Which of the following statements is correct about the Annual Loss Expectancy?

Options:

A.

It is the size of the damage claims resulting from not having carried out risk analyses effec tively.

B.

It is the average damage calculated by insurance companies for businesses in a country.

C.

It is the minimum amount for which a company should insure itself.

D.

It is the amount of damage that can occur as a result of an incident during the year.

Questions # 97:

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.

Network Security

B.

Physical security

C.

Access security

D.

Human resource security

Questions # 98:

In which of the following does CRAMM provide assistance?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Audits

B.

Contingency planning

C.

US7799 certification

D.

BS7799 certification

Questions # 99:

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

Options:

A.

Classification of owners

B.

Usage of information

C.

Identification of inventory

D.

Classification of information

Questions # 100:

John works as an IT Technician for uCertify Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

DoS

B.

Trojan horse

C.

Social engineering

D.

Replay attack

Viewing page 10 out of 14 pages
Viewing questions 91-100 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.