Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 13 out of 14 pages
Viewing questions 121-130 out of questions
Questions # 121:

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.

B.

It enables mass surveillance of communications in transit.

C.

It enables certain private bodies to demand that someone hand over keys to protected information.

D.

It allows certain public bodies to monitor people's Internet activities.

Questions # 122:

Sam is the CEO of Gentech Inc. The company is located in New York. He has to start a new project in order to increase the overall revenue of the company. Sam has to develop an ISMS policy. In which of the following phases of the PDCA cycle will Sam accomplish the task?

Options:

A.

Do

B.

Plan

C.

Act

D.

Check

Questions # 123:

Which of the following are responsibilities of the Service Level Manager?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To define Service Level Agreement

B.

To define the Service Level Agreement structure

C.

To define the Underpinning Contracts (UC) with external providers

D.

To define the Operational Level Agreements with internal providers

Questions # 124:

Which of the following types of cyberstalking damages the reputation of their victim and turns other people against them by setting up their own Websites, blogs, or user pages for this purpose?

Options:

A.

False accusation

B.

False victimization

C.

Encouraging others to harass the victim

D.

Attempts to gather information about the victim

Questions # 125:

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Resumption of hardware

B.

Resumption of data

C.

Resumption of sales

D.

Resumption of applications

Questions # 126:

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

Options:

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

Questions # 127:

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

Options:

A.

DDoS

B.

Logic bomb

C.

Sabotage

D.

Smurf

Questions # 128:

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Recovering data

B.

Sales estimation

C.

Running applications back online

D.

Fault detection

Questions # 129:

You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?

Options:

A.

Implement least privileges.

B.

Implement RBAC.

C.

Implement three way authentication.

D.

Implement separation of duties.

Questions # 130:

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Packet sniffing

B.

Spoofing

C.

Cryptanalysis

D.

Steganography

Viewing page 13 out of 14 pages
Viewing questions 121-130 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.