Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification G2700 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam G2700 Premium Access

View all detail and faqs for the G2700 exam


758 Students Passed

94% Average Score

96% Same Questions
Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following are the elements of Information Security Management System framework?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Implement

B.

Reset

C.

Plan

D.

Control

Questions # 62:

Which of the following are the malicious activities that can be performed by a bot/botnet?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can perform DDoS attacks.

B.

It can work as spambots that harvest email addresses from contact forms or guestbook pag es.

C.

It can work as virus or as a worm.

D.

It can be malicious File-name modifiers on anonymous file-sharing

Questions # 63:

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

Options:

A.

Failover

B.

Reduce power consumption

C.

Load balancing

D.

Ease of maintenance

Questions # 64:

Which of the following groupings is correct regarding security measures?

Options:

A.

Physical, logical, preventive, detective

B.

Organizational, preventive, corrective, physical

C.

Preventive, detective, repressive, corrective

D.

Logical, repressive, preventive, corrective

Questions # 65:

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

Options:

A.

Sharpen

B.

Soften

C.

Blur

D.

Rotate

Questions # 66:

Which of the following is a technical measure?

Options:

A.

Encryption of data

B.

Creation of a policy that defines what is and what is not permitted in the e-mail

C.

Allocation of information to an owner

D.

Storage of system management passwords

Questions # 67:

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Viewing an e-mail message

B.

Updating windows files automatically

C.

Visiting a website

D.

Clicking on a deceptive pop-up window

Questions # 68:

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.

B.

It enables mass surveillance of communications in transit.

C.

It enables certain private bodies to demand that someone hand over keys to protected information.

D.

It allows certain public bodies to monitor people's Internet activities.

Questions # 69:

Which of the following is a Restrict Anonymous registry value that allows users with explicit anonymous permissions?

Options:

A.

2

B.

3

C.

1

D.

0

Questions # 70:

Which of the following provides secure online payment services?

Options:

A.

ACH

B.

ICSA

C.

CA

D.

IEEE

Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.