Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 11 out of 14 pages
Viewing questions 101-110 out of questions
Questions # 101:

Which of the following statements is true about Return On Investment?

Options:

A.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

B.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

C.

It is the profit achieved through realization of improvements.

D.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

Questions # 102:

Which of the following is one of the mechanisms available for administrators to employ for replicating the databases containing the DNS data across a set of DNS servers?

Options:

A.

DNS zone transfer

B.

DNS cache poisoning

C.

DNS spoofing

D.

ARP spoofing

Questions # 103:

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Snow.exe

B.

Stegbreak

C.

Anti-x

D.

Image hide

Questions # 104:

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:

A.

vCard

B.

hCard

C.

HFS+

D.

FAT32

Questions # 105:

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Account lockout policy

B.

Chain of custody

C.

Incident response policy

D.

Separation of duties

Questions # 106:

Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?

Options:

A.

UDP

B.

SMTP

C.

ICMP

D.

SNMP

Questions # 107:

Fill in the blank with an appropriate phrase.

The______ is concerned with rebuilding production processing and determining the criticality of data.

Options:

A.

recovery team

Questions # 108:

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-10

B.

RAID-1

C.

RAID-5

D.

RAID-0

Questions # 109:

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

Options:

A.

Developing risk management plan to identify risks based on documents

B.

Developing project charter and risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Identifying and analyzing risk events using qualitative and quantitative techniques

Questions # 110:

You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following

are the other benefits of Single Sign-On (SSO)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Centralized reporting for compliance adherence

B.

Reducing IT costs due to lower number of IT help desk calls about passwords

C.

Reduces the user experience

D.

Reduces phishing success, because users are not trained to enter password everywhere without thinking

Viewing page 11 out of 14 pages
Viewing questions 101-110 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.