Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 12 out of 14 pages
Viewing questions 111-120 out of questions
Questions # 111:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where

significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Chosen-Stego Attack

B.

Active Attacks

C.

Stegdetect Attack

D.

Steg-Only Attack

Questions # 112:

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

Options:

A.

At every status meeting of the project team, project risk management is an agenda item.

B.

Project risk management is scheduled for every month in the 18-month project.

C.

Project risk management happens at every milestone.

D.

Project risk management has been concluded with the project planning.

Questions # 113:

Mark works as a Security Administrator for uCertify Inc. Somehow Mark comes to know that an employee is keeping illegal software on his workstation. After investigating, Mark finds that this is indeed true. Therefore, Mark decides to file a law suit against the organization, as it is against organization's norms to store illegal information. Now, the organization decides to call the police and suspend Mark from work till further internal inquiries. Which of the following practices has been implemented in this scenario?

Options:

A.

Due diligence

B.

Due process

C.

Privacy

D.

Due care

Questions # 114:

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Utility model

B.

Cookie

C.

Trade secret

D.

Copyright

Questions # 115:

Sam works as the Chief Information Security Officer for Blue Well Inc. There are a number of teams for the security purposes. Which of the following are the types of teams of which Sam can be a part of?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Computer Emergency Response Team

B.

Computer Data Development Team

C.

Computer Security Incident Response Team

D.

Computer Information Development Team

Questions # 116:

Which of the following paragraphs of the Turnbull Report stated that a company's system of internal control will include information and communication processes?

Options:

A.

Paragraph 28

B.

Paragraph 20

C.

Paragraph 21

D.

Paragraph 22

Questions # 117:

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

Options:

A.

Risk mitigation

B.

Risk acceptance

C.

Risk avoidance

D.

Risk transference

Questions # 118:

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

Options:

A.

System state data

B.

Users manual

C.

DNS record

D.

Cache memory

Questions # 119:

You work as a System Administrator for uCertify Inc. You have been given the task to create a new corporate policy. Which of the following approaches must be followed to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strategic approach

B.

Approach to Risk Management

C.

Clear and unambiguous approach

D.

Industry best practice

Questions # 120:

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Impersonation attack

B.

Reverse social engineering attack

C.

Important user posing attack

D.

In person attack

Viewing page 12 out of 14 pages
Viewing questions 111-120 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.