Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

Options:

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

Questions # 22:

Which of the following is the right approach for the identification and management of information security risks?

Options:

A.

Encryption of system state data

B.

Storage of topology records

C.

Establishment and continuous update of ISMS

D.

Indication of natural disaster

Questions # 23:

You work as an HR Manager for uCertify Inc. You are working on a checklist to develop an orderly exit process for the employees leaving your company. Which of the following actions should be included in that checklist?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To ensure that assets return in an expedited time frame

B.

To ensure that employees' access is removed

C.

To validate the references and the level of background checks

D.

To ensure that employees understand information security threats

Questions # 24:

What does CRAMM stand for?

Options:

A.

Continuous Risk Analysis and Management Method

B.

CCTA Risk Analysis and Management Method

C.

Continuous Risk Analyzer and Manager Methodology

D.

CCTA Risk Analyzer and Manager Methodology

Questions # 25:

Which of the following are steps of vulnerability management programs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Prioritize Vulnerabilities

B.

Baseline the Environment

C.

Shield and monitor

D.

Define Policy

Questions # 26:

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

Options:

A.

An organization should implement and maintain IDS to manage risks to the network.

B.

An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

C.

An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

D.

An organization should apply encryption to its information assets.

Questions # 27:

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Install the IAS server on the system to verify Internet related activities.

B.

Install the operating system without patches installed and use typical defaults and options.

C.

Install the application that is designed to record the activities of the invader.

D.

Install the RADIUS server to check the authentication of the invader.

Questions # 28:

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Human resource security deals with the employees handling personal data in an organization. Which section of ISO 27002 describes human resource security?

Options:

A.

Section 4

B.

Section 8

C.

Section 3

D.

Section 5

Questions # 29:

Which of the following phases of the PDCA model is the controlling and maintaining phase of the Information Security Management System (ISMS)?

Options:

A.

Check

B.

Act

C.

Do

D.

Plan

Questions # 30:

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Uptime

B.

Slowtime

C.

Downtime

D.

Peaktime

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.