Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
Questions # 51:

Sam works as the Network Administrator for uCertify Inc. He has been asked to perform risk analysis. Sam decides to perform it by using CRAMM. The CEO of the organization wants to know the positive points of CRAMM which is going to be used by Sam. Which of the following points will Sam tell the CEO of the organization?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides assistance in audits.

B.

It provides assistance in contingency planning.

C.

It promotes security awareness and acceptance.

D.

It provides a structured approach to risk analysis and management.

Questions # 52:

Which of the following is a technique for a threat, which creates changes to the project management plan?

Options:

A.

Risk transference

B.

Risk avoidance

C.

Risk mitigation

D.

Risk acceptance

Questions # 53:

David is the owner of Blue Well Inc. The company provides courier services. He decides that it is time to draw up risk analysis for his information system. This includes an inventory of threats and risks. What is the relation among threat, risk, and risk analysis?

Options:

A.

Risk analysis is used for removing the risk of a threat.

B.

Risk analysis is used for finding a balance between threats and risks.

C.

Risk analysis is used for identifying threats from known risks.

D.

Risk analysis is used for clarifying the relevant threats and the involved risks.

Questions # 54:

The guidelines that are defined in the ISO/IEC 27002:2005 standard deal with which of the following aspects of information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Procedural

B.

Situational

C.

Logical

D.

Physical

Questions # 55:

Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

Options:

A.

Supply chain management

B.

Inventory management

C.

Information security management

D.

Change management

Questions # 56:

You work as a Network Administrator for uCertify Inc. You have been assigned the task to select an access control method for the organization's online library so that unethical access can be stopped. You want to apply a condition, i.e., the employee name and the employee code should match to access the library. Which of the following access controls is appropriate to accomplish the task?

Options:

A.

Attribute-based access control

B.

Discretionary access control

C.

Role-based access control

D.

Mandatory access control

Questions # 57:

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:

A.

ACL

B.

Explicit Deny

C.

The principle of least privileges

D.

Implicit Allow

Questions # 58:

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

Options:

A.

Attribute-based access control

B.

Mandatory access control

C.

Discretionary access control

D.

Rule-based access control

Questions # 59:

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

Options:

A.

Risk mitigation

B.

Risk avoidance

C.

Risk transference

D.

Risk acceptance

Questions # 60:

Mark works as a Security Administrator for uCertify Inc. He is responsible to update Standard Operating Procedures (SOPs) in his organization. In this process, Mark needs to update many programs and modify some registry files in the operating system. He wants to make a document of each step taken by him, so that he can come back and restore the system to its actual state if any problem occurred in the update. Which type of document should Mark create to accomplish the task?

Options:

A.

Technical documentation

B.

Change control documentation

C.

Compliance documentation

D.

Legal documentation

Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.