Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

GIAC G2700 GIAC Certified ISO-2700 Specialist Practice Test Exam Practice Test

Demo: 66 questions
Total 453 questions

GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Question 1

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

Options:

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

Question 2

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to create a document following the Business Model of information security to provide guidelines for information assets. Which of the following are the elements of the Business Model for information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Process

B.

Technology

C.

People

D.

Training

E.

Organization Design and Strategy

Question 3

Mark works as a Data Center Manager for TechNet Inc. A few days ago, he published a blog about himself during his working hours. However, as per the organization's policy, any member of the organization cannot use any resources of the organization for his personal use. Since Mark has violated the policy, he should go to an internal committee and be informed of his rights in the matter. Which of the following practices is being implemented?

Options:

A.

Due process

B.

Integrity Management Consulting

C.

Due diligence

D.

Due care

Question 4

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cost of lost income from missed sales

B.

Sales aspect of the business

C.

Cost of low productivity

D.

Innovations in electronic funds transfer

Question 5

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Uptime

B.

Slowtime

C.

Downtime

D.

Peaktime

Question 6

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hybrid attack

B.

Brute Force attack

C.

Dictionary attack

D.

Rule based attack

Question 7

An audit trail is an example of which of the following types of control?

Options:

A.

Detective control

B.

Application control

C.

Preventive control

D.

Deterrent control

Question 8

Which of the following are computer clusters that are implemented primarily for the purpose of providing high availability of services which the cluster provides?

Options:

A.

High-availability clusters

B.

Globular clusters

C.

Load balancing clusters

D.

Tightly-coupled compute clusters

Question 9

Mark works as a Network Security Administrator for uCertify Inc. He wants to implement a firewall technique over the network to inspect each packet passing through the network and to accept or reject it, based on user-defined rules. Which of the following types of firewall techniques is implemented by Mark to accomplish the task?

Options:

A.

Application gateway

B.

Proxy server

C.

Circuit-level gateway

D.

Packet filter

Question 10

You work as an HR Manager for uCertify Inc. You are working on a checklist to develop an orderly exit process for the employees leaving your company. Which of the following actions should be included in that checklist?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To ensure that assets return in an expedited time frame

B.

To ensure that employees' access is removed

C.

To validate the references and the level of background checks

D.

To ensure that employees understand information security threats

Question 11

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Clicking on a deceptive pop-up window

B.

Updating windows files automatically

C.

Visiting a website

D.

Viewing an e-mail message

Question 12

Which of the following policies defines the goals and elements of an organization's computer systems?

Options:

A.

Public

B.

Corporate

C.

Human resource

D.

Computer security

Question 13

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:

A.

Deterrent control

B.

Application control

C.

Preventive control

D.

Detective control

Question 14

Which of the following phases of the PDCA model is the controlling and maintaining phase of the Information Security Management System (ISMS)?

Options:

A.

Check

B.

Act

C.

Do

D.

Plan

Question 15

You work as a Security Administrator for uCertify Inc. You have been assigned the task to apply a data availability solution based on a striped disk array without redundancy. Which of the following will you use to accomplish the task?

Options:

A.

RAID 3/4

B.

RAID 1

C.

RAID 5

D.

RAID 0

Question 16

Which of the following statements is related to residual risks?

Options:

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is the probabilistic risk before implementing all security measures.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk after implementing all security measures.

Question 17

Which of the following statements is true about annualized rate of occurrence?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Question 18

You work as a Security Administrator for uCertify Inc. You have been assigned the task to apply a data availability solution based on a striped disk array without redundancy. Which of the following will you use to accomplish the task?

Options:

A.

RAID 5

B.

RAID 0

C.

RAID 1

D.

RAID 3/4

Question 19

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

Options:

A.

Developing risk management plan to identify risks based on documents

B.

Developing project charter and risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Identifying and analyzing risk events using qualitative and quantitative techniques

Question 20

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Running applications back online

B.

Recovering data

C.

Fault detection

D.

Sales estimation

Question 21

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to

submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset Value

B.

Single Loss Expectancy

C.

Annualized Rate of Occurrence

D.

Number of employees in the company

Question 22

You work as a Network Security Administrator for uCertify Inc. Your organization has set up a new Internet connection in place of the previous one. It is your responsibility to ensure that employees use the Internet only for official purposes. While reviewing Internet usages, you find that a few people have traversed and downloaded some inappropriate and illegal information. You want to make a policy to stop all these activities in the future. Which of the following policies will you implement to accomplish the task?

Options:

A.

Acceptable use policy

B.

Privacy policy

C.

Security policy

D.

Due care policy

Question 23

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Utility model

B.

Cookie

C.

Trade secret

D.

Copyright

Question 24

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Recovering data

B.

Sales estimation

C.

Running applications back online

D.

Fault detection

Question 25

David works as the Chief Information Security Officer for uCertify Inc. Which of the following are the responsibilities that should be handled by David?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Information development

B.

Information risk management

C.

Information privacy

D.

Information security

Question 26

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

Options:

A.

Logic bomb

B.

Sabotage

C.

Smurf

D.

DDoS

Question 27

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where

significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Chosen-Stego Attack

B.

Active Attacks

C.

Stegdetect Attack

D.

Steg-Only Attack

Question 28

Which of the following statements is true about pattern matching IDS?

Options:

A.

IDS can match empty list only.

B.

IDS can only be effective unless the company's security policies are not defined and followed in practice.

C.

IDS can trigger only on signatures that are stored in the database of the IDS.

D.

IDS can detect only when an attacker is passively sniffing data.

Question 29

Fill in the blank with the appropriate term.

______is a prime example of a high-interaction honeypot.

Options:

Question 30

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Technical steganography

C.

Perceptual masking

D.

Text Semagrams

Question 31

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the slowest method for taking a data backup.

B.

It is the fastest method of backing up data.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Question 32

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Personal security

B.

Network Security

C.

Physical security

D.

Human resource security

Question 33

You work as a Security Administrator for uCertify Inc. You have been assigned a task for helping employees in determining appropriate technical security measures available for electronic information that is deemed sensitive. Which of the following policies will you apply to accomplish the task?

Options:

A.

Default policy

B.

Enterprise policy

C.

Information security policy

D.

Security policy

Question 34

Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Calculate

B.

Act

C.

Plan

D.

Deviate

Question 35

A business impact analysis should be reviewed at a minimum annually but there are a few events in which it should be reviewed more frequently. Which of the following are these events?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Significant changes in the internal business process, location, or technology

B.

A part of a service contract where the level of service is formally defined

C.

A particularly aggressive pace of business change

D.

Significant changes in the external business environment

Question 36

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to classify different information assets used in your organization. Which of the following should be the basis of your classification?

Options:

A.

Usage of the information for the organization

B.

Owner of the information

C.

Origin of the information

D.

Impact on the organization if information is disclosed

Question 37

You work as a Security Administrator for uCertify Inc. You are responsible for securing the network of the organization. While checking your network log files, you find that someone is sending too many data packets over a long period of time. These data packets are difficult to be detected by IDS. Which of the following types of attacks is this?

Options:

A.

Blind spoofing

B.

Session hijacking

C.

Session splicing

D.

Nonblind spoofing

Question 38

Which of the following groupings is correct regarding security measures?

Options:

A.

Physical, logical, preventive, detective

B.

Organizational, preventive, corrective, physical

C.

Preventive, detective, repressive, corrective

D.

Logical, repressive, preventive, corrective

Question 39

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Packet sniffing

C.

Cryptanalysis

D.

Steganography

Question 40

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Awareness and Training Material Development

B.

Awareness and Training Material Implementation

C.

Awareness and Training Program Design

D.

Awareness and Training Material Effectiveness

Question 41

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:

A.

ACL

B.

Explicit Deny

C.

The principle of least privileges

D.

Implicit Allow

Question 42

You work as a Security Administrator for uCertify Inc. You have been assigned a task for helping employees in determining appropriate technical security measures available for electronic information that is deemed sensitive. Which of the following policies will you apply to accomplish the task?

Options:

A.

Default policy

B.

Information security policy

C.

Security policy

D.

Enterprise policy

Question 43

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

Options:

A.

ALE=asset value ($)/exposure factor (EF)

B.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

C.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

D.

ALE=asset value ($)*exposure factor (EF)

Question 44

Which of the following represents the software component of IT asset management?

Options:

A.

RSG

B.

SAM

C.

NAS

D.

SAN

Question 45

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

Options:

A.

Project risk management happens at every milestone.

B.

Project risk management has been concluded with the project planning.

C.

At every status meeting of the project team, project risk management is an agenda item.

D.

Project risk management is scheduled for every month in the 18-month project.

Question 46

Sam works as the Network Administrator for uCertify Inc. The information of a sensitive nature is processed. The highest-level security measures are to be implemented by management. What is this kind of risk strategy called?

Options:

A.

Risk compensating

B.

Risk avoiding

C.

Risk bearing

D.

Risk neutral

Question 47

David works as the Network Administrator for Blue Well Inc. He has been asked to perform risk analysis. He decides to perform it by using CRAMM. The CEO of the company wants to know the stronger points of CRAMM that is going to be used by David. Which of the following points will David tell the CEO of the organization?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It requires protecting a high risk system.

B.

It is effective to meet the objectives of its sub-group.

C.

It does not provide protection against any threat.

D.

It is expensive to implement.

Question 48

Which of the following Acts is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals?

Options:

A.

Privacy Act

B.

Equal Credit Opportunity Act

C.

Stalking Amendment Act (1999)

D.

Gramm-Leach-Bliley Act

Question 49

Which of the following groupings is correct regarding security measures?

Options:

A.

Physical, logical, preventive, detective

B.

Preventive, detective, repressive, corrective

C.

Logical, repressive, preventive, corrective

D.

Organizational, preventive, corrective, physical

Question 50

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

Options:

A.

Personal data

B.

Electricity

C.

Reputation of the company

D.

Equipment

Question 51

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It depends on the cultural aspects.

B.

It depends on the infrastructure aspects of the organization.

C.

It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

D.

It depends on the physical aspects of the organization.

Question 52

You work as a Security Administrator for uCertify Inc. You have been assigned a task to implement information classification levels. You want to put the highly sensitive documents that should only be accessed by few people of the organization. In which of the following information classification levels should you put those documents?

Options:

A.

Department specific

B.

High security levels

C.

Not to be copied

D.

Classified

Question 53

Which of the following is also known as the 'Code for Information Security'?

Options:

A.

ISO/IEC 20002 standard

B.

ISO/IEC 27001:2005 standard

C.

ISO/IEC 27002:2005 standard

D.

ISO/IEC 20000 standard

Question 54

Which of the following provides secure online payment services?

Options:

A.

ACH

B.

ICSA

C.

CA

D.

IEEE

Question 55

Fill in the blank with the appropriate term.

___________is the built-in file encryption tool for Windows file systems. It protects encrypted files from those who have physical possession of the computer where the encrypted files are stored.

Options:

Question 56

Which of the following are the things included by sensitive system isolation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Construction of appropriately isolated environments where technically and operationally feasible

B.

Inclusion of all documents technically stored in a virtual directory

C.

Explicit identification and acceptance of risks when shared facilities and/or resources must be used

D.

Explicit identification and documentation of sensitivity by each system/application controller (owner)

Question 57

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

Options:

A.

Classification of owners

B.

Usage of information

C.

Identification of inventory

D.

Classification of information

Question 58

You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.

Which of the following are the main objectives of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Minimal disruption of services

B.

Reduction of inventory in accordance with revenue

C.

Economic utilization of resources involved in the change

D.

Reduction in back-out activities

Question 59

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

Question 60

Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?

Options:

A.

Honeypot

B.

Internet bot

C.

Crawler

D.

Spider

Question 61

Which of the following documents is developed along the risk management processes to monitor and control risks?

Options:

A.

Fault tree

B.

Risk mitigation

C.

Decision tree

D.

Risk register

Question 62

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

Options:

A.

Carry out a risk analysis.

B.

Formulate information security policy.

C.

Set up monitoring.

D.

Carry out an evaluation.

Question 63

Which of the following Acts enacted in the United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Wiretap Act

B.

Electronic Communications Privacy Act of 1986

C.

Economic Espionage Act of 1996

D.

Computer Fraud and Abuse Act

Question 64

Which of the following statements is true about Return On Investment?

Options:

A.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

B.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

C.

It is the profit achieved through realization of improvements.

D.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

Question 65

Which of the following statements describes the purpose of information security policy?

Options:

A.

The security policy makes the security plan flawless by providing the necessary details.

B.

The security policy provides direction and support to the management regarding information security.

C.

Analysis of risks and search for countermeasures are known as Policy Documents.

D.

The security policy provides details about threats and the consequences.

Question 66

Which of the following is the designing phase of the ISMS?

Options:

A.

Check

B.

Plan

C.

Act

D.

Do

Demo: 66 questions
Total 453 questions