Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

G2700 Sample Questions Answers

Questions 4

David works as the Chief Information Security Officer for uCertify Inc. Which of the following are the responsibilities that should be handled by David?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Information development

B.

Information risk management

C.

Information privacy

D.

Information security

Buy Now
Questions 5

Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?

Options:

A.

Business Impact Analysis (BIA)

B.

Continual Service Improvement (CSI)

C.

Recovery Point Objective (RPO)

D.

Business Continuity Plan (BCP)

Buy Now
Questions 6

Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?

Options:

A.

Recovery Consistency Objective

B.

Recovery Time Actual

C.

Recovery Time Objective

D.

Recovery Point Objective

Buy Now
Questions 7

Which of the following tools can be used to detect steganography?

Options:

A.

Dskprobe

B.

ImageHide

C.

Blindside

D.

Snow

Buy Now
Questions 8

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory?

Options:

A.

Ping of death

B.

Self-modifying code

C.

Heap overflow

D.

Buffer overflow

Buy Now
Questions 9

Risk analysis provides a great deal of useful information. It has four main objectives. Which of the following is not an objective of risk analysis?

Options:

A.

To identify assets and their value

B.

To determine a balance between the costs of an incident and a security measure

C.

To determine vulnerabilities and threats

D.

To determine the costs of threats

Buy Now
Questions 10

Which of the following Acts, enacted in the United States, amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

The USA Patriot Act of 2001

B.

Civil Rights Act of 1991

C.

Sexual Predators Act

D.

PROTECT Act

Buy Now
Questions 11

You work as a Security Administrator for uCertify Inc. You have been assigned the task to provide a solution based on high reliability combined with high performance. Which of the following will you use to accomplish the task?

Options:

A.

RAID 10

B.

RAID 5

C.

RAID 0

D.

RAID 1

Buy Now
Questions 12

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share organization's personal requirements regarding the tool to the third party using a non disclosure agreement (NDA). Which of the following is the purpose of using NDA?

Options:

A.

To ensure that the third-party organization respects the security of information to be share d

B.

To be used as an acknowledgement

C.

To ensure the protection of intellectual copyright of information

D.

To be used as a legal disclaimer

Buy Now
Questions 13

Sam works as the Chief Information Security Officer for Blue Well Inc. There are a number of teams for the security purposes. Which of the following are the types of teams of which Sam can be a part of?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Computer Data Development Team

B.

Computer Security Incident Response Team

C.

Computer Information Development Team

D.

Computer Emergency Response Team

Buy Now
Questions 14

Which of the following Acts is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals?

Options:

A.

Privacy Act

B.

Equal Credit Opportunity Act

C.

Stalking Amendment Act (1999)

D.

Gramm-Leach-Bliley Act

Buy Now
Questions 15

Which of the following types of viruses is placed into the first sector of the hard drive?

Options:

A.

Multipartite

B.

Master boot record

C.

File

D.

Boot sector

Buy Now
Questions 16

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cost of lost income from missed sales

B.

Sales aspect of the business

C.

Cost of low productivity

D.

Innovations in electronic funds transfer

Buy Now
Questions 17

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:

A.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

D.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

Buy Now
Questions 18

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

Options:

A.

ALE=asset value ($)/exposure factor (EF)

B.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

C.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

D.

ALE=asset value ($)*exposure factor (EF)

Buy Now
Questions 19

Which of the following standards was made in 1995 by the joint initiative of the Department of Trade and Industry in the United Kingdom and leading UK private-sector businesses?

Options:

A.

BS7799

B.

ISO 27001

C.

BS2700

D.

ISMS

Buy Now
Questions 20

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of ISMS. Which of the following steps are concerned with the development of ISMS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk management

B.

HR security planning

C.

Statement of Applicability

D.

Selection of appropriate controls

Buy Now
Questions 21

David works as the Network Administrator for Blue Well Inc. One of his tasks is to develop and maintain risk management plan. Which of the following are the objectives of risk management plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Eliminating risks

B.

Accepting risks cautiously that cannot be eliminated

C.

Developing required risks

D.

Transferring risks by insurance

Buy Now
Questions 22

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.

Access security

B.

Human resource security

C.

Physical security

D.

Network Security

Buy Now
Questions 23

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

Options:

A.

Project risk management happens at every milestone.

B.

Project risk management has been concluded with the project planning.

C.

At every status meeting of the project team, project risk management is an agenda item.

D.

Project risk management is scheduled for every month in the 18-month project.

Buy Now
Questions 24

Service Level Agreement (SLA) provides one service for all customers of that service. Which of the following are the contents included by SLAs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Scope

B.

Mutual responsibilities

C.

Vocations

D.

Service description

Buy Now
Questions 25

Which of the following are social engineering techniques?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Pretexting

B.

Phishing

C.

Baiting

D.

Salami attack

Buy Now
Questions 26

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

Options:

A.

Personal data

B.

Electricity

C.

Reputation of the company

D.

Equipment

Buy Now
Questions 27

Which of the following tasks are accomplished in the Act phase of the PDCA cycle?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The improvements to ISMS are identified.

B.

The improvements to ISMS are implemented.

C.

The improvements to ISMS are developed.

D.

The improvements to ISMS are documented.

Buy Now
Questions 28

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Viewing an e-mail message

B.

Updating windows files automatically

C.

Visiting a website

D.

Clicking on a deceptive pop-up window

Buy Now
Questions 29

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

Options:

A.

An organization should implement and maintain IDS to manage risks to the network.

B.

An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

C.

An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

D.

An organization should apply encryption to its information assets.

Buy Now
Questions 30

Which of the following are the steps of the process of risk assessing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Deletion of threats

B.

Identification of the relationships

C.

Identification of potential threats

D.

Identification of assets

Buy Now
Questions 31

Which of the following is an example of a corrective measure?

Options:

A.

To install a virus scanner

B.

To make a backup of the data that has been created or altered

C.

To restore a backup of the correct database

D.

To incorporate an Intrusion Detection System

Buy Now
Questions 32

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

Options:

A.

Attribute-based access control

B.

Mandatory access control

C.

Discretionary access control

D.

Rule-based access control

Buy Now
Questions 33

Which of the following pillars of Basel II is concerned with maintenance of regulatory capital intended for three major components of risk that a bank faces, which are credit risk, operational risk, and market risk?

Options:

A.

Pillar 4

B.

Pillar 2

C.

Pillar 3

D.

Pillar 1

Buy Now
Questions 34

Which of the following are computer clusters that are implemented primarily for the purpose of providing high availability of services which the cluster provides?

Options:

A.

High-availability clusters

B.

Globular clusters

C.

Load balancing clusters

D.

Tightly-coupled compute clusters

Buy Now
Questions 35

An employee of your company has stolen some files and records. Which of the following security standards is concerned with this event?

Options:

A.

Business security

B.

Human right security

C.

Human security

D.

Human resource security

Buy Now
Questions 36

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations security. Which of the following controls of the ISO standard deals with equipment security?

Options:

A.

Control A.8.1

B.

Control A.10.1

C.

Control A.7.1

D.

Control A.9.2

Buy Now
Questions 37

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

Options:

A.

Risk avoidance

B.

Risk transference

C.

Risk mitigation

D.

Risk acceptance

Buy Now
Questions 38

Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Calculate

B.

Act

C.

Plan

D.

Deviate

Buy Now
Questions 39

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

Options:

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

Buy Now
Questions 40

Which of the following concepts or terms states that changes related to one requirement, i.e., scope, time, or cost, will at least influence one other element?

Options:

A.

Triple theory estimation

B.

Triple point theory

C.

Triple point estimation

D.

Triple constraint

Buy Now
Questions 41

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to establish ISO standards for your organization. Which of the following standards provides guidelines on specifications and use of measurement techniques for the assessment of the effectiveness of an implemented information security management system and controls?

Options:

A.

BS7799

B.

ISO 27001

C.

ISO 9001

D.

ISO 27004

Buy Now
Questions 42

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.

Access security

B.

Physical security

C.

Human resource security

D.

Network Security

Buy Now
Questions 43

You work as a System Administrator for uCertify Inc. You have been given the task to create a new corporate policy. Which of the following approaches must be followed to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strategic approach

B.

Approach to Risk Management

C.

Clear and unambiguous approach

D.

Industry best practice

Buy Now
Questions 44

Which of the following tools can be used to detect steganography?

Options:

A.

Blindside

B.

Snow

C.

Dskprobe

Buy Now
Questions 45

A honey pot is a computer trap that is used to attract potential intruders or attackers. Which of the following are some advantages of honey pots?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk of takeover

B.

Limited view

C.

Small set of data

D.

Reduced false positives

Buy Now
Questions 46

Which of the following statements is true about annualized rate of occurrence?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Buy Now
Questions 47

Which of the following are the rights that are given to the person who has processed data?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To require that their data is used for direct marketing

B.

To view the data an organization holds on them, for a small fee, known as 'subject access f ee'

C.

To require that data is not used in any way that may potentially cause damage or distress

D.

To request that incorrect information be corrected

Buy Now
Questions 48

Which of the following phases of the PDCA model is the controlling and maintaining phase of the Information Security Management System (ISMS)?

Options:

A.

Do

B.

Plan

C.

Check

D.

Act

Buy Now
Questions 49

David is the owner of Blue Well Inc. The company provides courier services. He decides that it is time to draw up risk analysis for his information system. This includes an inventory of threats and risks. What is the relation among threat, risk, and risk analysis?

Options:

A.

Risk analysis is used for removing the risk of a threat.

B.

Risk analysis is used for finding a balance between threats and risks.

C.

Risk analysis is used for identifying threats from known risks.

D.

Risk analysis is used for clarifying the relevant threats and the involved risks.

Buy Now
Questions 50

Which of the following plans provides measures for disseminating status report to personnel and the public?

Options:

A.

Contingency plan

B.

Disaster recovery plan

C.

Business continuity plan

D.

Crisis communication plan

Buy Now
Questions 51

The guidelines that are defined in the ISO/IEC 27002:2005 standard deal with which of the following aspects of information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Procedural

B.

Situational

C.

Logical

D.

Physical

Buy Now
Questions 52

Mark works as a Network Security Administrator for uCertify Inc. He wants to implement a firewall technique over the network to inspect each packet passing through the network and to accept or reject it, based on user-defined rules. Which of the following types of firewall techniques is implemented by Mark to accomplish the task?

Options:

A.

Application gateway

B.

Proxy server

C.

Circuit-level gateway

D.

Packet filter

Buy Now
Questions 53

Which of the following surveys found that the smaller organizations had had a better understanding of their information assets?

Options:

A.

DTI Survey

B.

CBI Cyber Crime Survey

C.

Information Security Breaches Survey (ISBS) 2006

D.

KPMG's Information Security Survey 2000

Buy Now
Questions 54

You work as the Network Security Administrator for uCertify Inc. The organization is using an intranet to distribute information to its employees. A database residing on the network contains employees' information, such as employee name, designation, department, phone extension, date of birth, date of joining, etc. You are concerned about the security because the database has all information about employees, which can help an unauthorized person to recognize an individual. Which Personally Identifiable Information should be removed from the database so that the unauthorized person cannot identify an individual?

Options:

A.

Date of birth

B.

Employee name

C.

Employee code

D.

Date of joining

Buy Now
Questions 55

You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Centralized reporting for compliance adherence

B.

Reducing IT costs due to lower number of IT help desk calls about passwords

C.

Reduces phishing success, because users are not trained to enter password everywhere without thinking

D.

Reduces the user experience

Buy Now
Questions 56

Which of the following defines the interdependent relationships among the internal support groups of an organization working to support a Service Level Agreement?

Options:

A.

Two-way Connection Agreement

B.

System Security Authorization Agreement

C.

Operational Level Agreement

D.

Non Disclosure Agreement

Buy Now
Questions 57

Which of the following is a Restrict Anonymous registry value that allows users with explicit anonymous permissions?

Options:

A.

2

B.

3

C.

1

D.

0

Buy Now
Questions 58

David works as the Chief Information Security Officer for uCertify Inc. Which of the following are the responsibilities that should be handled by David?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Information security

B.

Information risk management

C.

Information privacy

D.

Information development

Buy Now
Questions 59

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

Buy Now
Questions 60

Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?

Options:

A.

Honeypot

B.

Internet bot

C.

Crawler

D.

Spider

Buy Now
Questions 61

Mark is hired as an Information Security Officer for BlueWell Inc. He wants to draw the attention of the management towards the significance of integrating information security in the business processes.

Which of the following tasks should he perform first to accomplish the task?

Options:

A.

He should perform a risk assessment.

B.

He should develop an information security policy.

C.

He should set up a security budget.

D.

He should obtain benchmarking information.

Buy Now
Questions 62

Which of the following paragraphs of the Turnbull Guidance provide clear description of the principles of a risk treatment plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

16

B.

18

C.

17

D.

19

Buy Now
Questions 63

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

Options:

A.

DDoS

B.

Logic bomb

C.

Sabotage

D.

Smurf

Buy Now
Questions 64

You work as a Security Administrator for uCertify Inc. You have been assigned the task to apply a data availability solution based on a striped disk array without redundancy. Which of the following will you use to accomplish the task?

Options:

A.

RAID 5

B.

RAID 0

C.

RAID 1

D.

RAID 3/4

Buy Now
Questions 65

Fill in the blank with an appropriate phrase.

The______ is concerned with rebuilding production processing and determining the criticality of data.

Options:

A.

recovery team

Buy Now
Questions 66

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Awareness and Training Material Development

B.

Awareness and Training Material Implementation

C.

Awareness and Training Program Design

D.

Awareness and Training Material Effectiveness

Buy Now
Questions 67

You work as a Security Administrator for uCertify Inc. You have made a plan to increase the security of the organization and you want to show this to the CEO of the organization. But, you do not want to share this information with others. Therefore, you want to classify this information.

Which of the following will be the suitable classification to accomplish the task?

Options:

A.

Private or confidential

B.

Management only

C.

Department specific

D.

Classified

Buy Now
Questions 68

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

Options:

A.

Risk mitigation

B.

Risk avoidance

C.

Risk acceptance

D.

Risk transference

Buy Now
Questions 69

Which of the following is a technique for a threat, which creates changes to the project management plan?

Options:

A.

Risk transference

B.

Risk avoidance

C.

Risk mitigation

D.

Risk acceptance

Buy Now
Questions 70

Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical computer systems that are necessary to support business continuity. All these tiers provide a simple method to define current service levels and associated risks. Choose and re-order the tiers of disaster recovery plan.

Options:

A.

Buy Now
Questions 71

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to create a document following the Business Model of information security to provide guidelines for information assets. Which of the following are the elements of the Business Model for information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Technology

B.

People

C.

Training

D.

Organization Design and Strategy

E.

Process

Buy Now
Questions 72

Which of the following is a fast-emerging global sector that advises individuals and corporations on how to apply the highest ethical standards to every aspect of their business?

Options:

A.

Service Capacity Management (SCM)

B.

Business Capacity Management (BCM)

C.

Resource Capacity Management (RCM)

D.

Integrity Management Consulting

Buy Now
Questions 73

In which of the following does CRAMM provide assistance?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Audits

B.

Contingency planning

C.

US7799 certification

D.

BS7799 certification

Buy Now
Questions 74

Which of the following administrative policy controls is usually associated with government classifications of materials and the clearances of individuals to access those materials?

Options:

A.

Separation of Duties

B.

Due Care

C.

Acceptable Use

D.

Need to Know

Buy Now
Questions 75

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the usage of information assets. Which of the following controls of the ISO standard deals with the documentation and implementation of rules for the acceptable use of information assets?

Options:

A.

Control A.7.2.1

B.

Control A.7.1.2

C.

Control A.7.1.3

D.

Control A.7.2

Buy Now
Questions 76

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of control A.10.1.1. What is the purpose of control A.10.1.1?

Options:

A.

It is concerned with the documentation of the human resource security to make recruitments clear to the organization.

B.

It is concerned with the documentation of the supply chain management.

C.

It is concerned with the documentation of operating procedures to ensure the correct and secure use of information processing facilities.

D.

It is concerned with the documentation of the disaster recovery management to ensure proper backup technologies.

Buy Now
Questions 77

Which of the following tasks are performed by Information Security Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is designed to protect information and any equipment that is used in connection with its storage, transmission, and processing.

B.

It is designed to develop information and any equipment that is used in connection with its storage, transmission, and processing.

C.

It is designed to recognize information and any equipment that is used in connection with its storage, transmission, and processing.

D.

It is designed to control information and any equipment that is used in connection with its storage, transmission, and processing.

Buy Now
Questions 78

Mark works as a Network Security Administrator for uCertify Inc. An employee of the organization comes to Mark and tells him that a few months ago, the employee had filled an online bank form due to some account related work. Today, when again visiting the site, the employee finds that some of his personal information is still being displayed in the webpage. Which of the following types of cookies should be disabled by Mark to resolve the issue?

Options:

A.

Session

B.

Temporary

C.

Secure

D.

Persistent

Buy Now
Questions 79

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Security Threat

C.

Project schedule

D.

Team members list

E.

Risk analysis

Buy Now
Questions 80

Which of the following are the things included by sensitive system isolation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Construction of appropriately isolated environments where technically and operationally feasible

B.

Inclusion of all documents technically stored in a virtual directory

C.

Explicit identification and acceptance of risks when shared facilities and/or resources must be used

D.

Explicit identification and documentation of sensitivity by each system/application controller (owner)

Buy Now
Questions 81

Business Continuity Planning (BCP) determines the risks to the organizational processes and creates policies, plans, and procedures in order to minimize the impact of those risks. What are the different steps in the Business Continuity Planning process?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Business Analysis

B.

Continuity planning

C.

Project scope and planning

D.

Approval and implementation

E.

Business Impact Assessment

Buy Now
Questions 82

You work as a Network Administrator for uCertify Inc. The organization has constructed a cafeteria for their employees and you are responsible to select the access control method for the cafeteria.

There are a few conditions for giving access to the employees, which are as follows:

1. Top level management can get access any time.

2. Staff members can get access during the specified hours.

3. Guests can get access only in working hours.

Which of the following access control methods is suitable to accomplish the task?

Options:

A.

Discretionary access control

B.

Lattice-based access control

C.

Attribute-based access control

D.

Rule-based access control

Buy Now
Questions 83

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User manuals

B.

Operating systems

C.

Training metarials

D.

Personal data

Buy Now
Questions 84

Which of the following information security standards deals with the protection of the computer facilities?

Options:

A.

Physical and environmental security

B.

Compliance

C.

Organization of information security

D.

Risk assessment and treatment

Buy Now
Questions 85

Which of the following statements is true about Return On Investment?

Options:

A.

It is the profit achieved through realization of improvements.

B.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

C.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

D.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

Buy Now
Questions 86

Which of the following is the process of restoring a previous copy of the data to a known point of consistency?

Options:

A.

Disaster Restart

B.

Downtime Restart

C.

Downtime

D.

Disaster Recovery

Buy Now
Questions 87

Which of the following is not one of the objectives of risk analysis?

Options:

A.

Determining the risk that threats will become a reality

B.

Identifying assets and their value

C.

Removing the risks

D.

Determining vulnerabilities and threats

Buy Now
Questions 88

Which of the following sections come under the ISO/IEC 27002 standard?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset management

B.

Security policy

C.

Financial assessment

D.

Risk assessment

Buy Now
Questions 89

Sam works as the Security Administrator for Blue Well Inc. He has to develop controls as the countermeasures to risks. Which of the following are the types of controls that Sam may employ for security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Transitive

B.

Corrective

C.

Preventive

D.

Detective

Buy Now
Questions 90

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:

A.

Deterrent control

B.

Detective control

C.

Preventive control

D.

Application control

Buy Now
Questions 91

You work as an Information Security Officer for uCertify Inc. You need to create an asset management plan differentiating fixed assets from inventory items. How will you differentiate assets from inventory items?

Options:

A.

Inventory items are sold.

B.

Assets are temporary usually.

C.

Inventory items are permanent.

D.

Assets cannot be used.

Buy Now
Questions 92

Which of the following statements is correct about the Annual Loss Expectancy?

Options:

A.

It is the size of the damage claims resulting from not having carried out risk analyses effec tively.

B.

It is the average damage calculated by insurance companies for businesses in a country.

C.

It is the minimum amount for which a company should insure itself.

D.

It is the amount of damage that can occur as a result of an incident during the year.

Buy Now
Questions 93

Which of the following plans provides measures and capabilities for recovering a major application or general support system?

Options:

A.

Disaster recovery plan

B.

Crisis communication plan

C.

Contingency plan

D.

Business continuity plan

Buy Now
Questions 94

Fill in the blank with the appropriate term.

________ is a powerful and low-interaction open source honeypot.

Options:

Buy Now
Questions 95

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It depends on the cultural aspects.

B.

It depends on the infrastructure aspects of the organization.

C.

It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

D.

It depends on the physical aspects of the organization.

Buy Now
Questions 96

Which of the following is used for secure financial transactions over the Internet?

Options:

A.

ATM

B.

VPN

C.

SSL

D.

SET

Buy Now
Questions 97

Which of the following is a technical measure?

Options:

A.

Encryption of data

B.

Creation of a policy that defines what is and what is not permitted in the e-mail

C.

Allocation of information to an owner

D.

Storage of system management passwords

Buy Now
Questions 98

Victor wants to send an encrypted message to his friend. He is using a steganography technique to accomplish his task. He takes a cover object and changes it accordingly to hide information.

This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following steganography methods is Victor using to accomplish his task?

Options:

A.

The distortion technique

B.

The substitution technique

C.

The cover generation technique

D.

The spread spectrum technique

Buy Now
Questions 99

Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Options:

A.

SLE = Asset Value (AV) * Exposure Factor (EF)

B.

SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

C.

SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)

D.

SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

Buy Now
Questions 100

Mark works as an Office Assistant for uCertify Inc. He is responsible for managing office documents. Today, after opening a word document, Mark noticed that the other opened documents are closed suddenly. After reopening those documents, Mark found some modifications in the documents. He contacted his Security Administrator and came to know that there is a virus program installed in the operating system. Which of the following types of virus has attacked the operating system?

Options:

A.

Data file

B.

Macro

C.

Polymorphic

D.

Boot sector

Buy Now
Questions 101

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.

Network Security

B.

Physical security

C.

Access security

D.

Human resource security

Buy Now
Questions 102

Which of the following is one of the mechanisms available for administrators to employ for replicating the databases containing the DNS data across a set of DNS servers?

Options:

A.

DNS zone transfer

B.

DNS cache poisoning

C.

DNS spoofing

D.

ARP spoofing

Buy Now
Questions 103

The stronger points of CRAMM assist prioritization by providing a countermeasure with high priority if some conditions are met. Which of the following are these conditions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It requires protecting a high risk system.

B.

It does not require the installation of alternative countermeasures.

C.

It is inexpensive to implement.

D.

It provides protection against several threats.

Buy Now
Questions 104

You work as a Project Manager for uCertify Inc. You are working on an asset management plan.

You need to make the documentation on every single process related to asset management.

Which of the following is an example of asset management?

Options:

A.

Making DR plan

B.

Tracking references

C.

Checking topology

D.

Tracking inventory

Buy Now
Questions 105

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

Options:

A.

Data owner

B.

Data custodian

C.

Auditor

D.

User

Buy Now
Questions 106

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Clicking on a deceptive pop-up window

B.

Updating windows files automatically

C.

Visiting a website

D.

Viewing an e-mail message

Buy Now
Questions 107

Which of the following specifies value of each asset?

Options:

A.

Asset importance

B.

Asset protection

C.

Asset responsibility

D.

Asset identification

Buy Now
Questions 108

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Uptime

B.

Slowtime

C.

Downtime

D.

Peaktime

Buy Now
Questions 109

Which of the following are the limitations of Redundant Array of Inexpensive Disks (RAID)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is difficult to move RAID to a new system.

B.

It cannot simplify disaster recovery.

C.

It cannot provide a performance boost in all applications.

D.

It cannot protect the data on the array.

Buy Now
Questions 110

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You are making the documentation on control A.7.2. Which of the following are the main objectives of control A.7.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using

B.

Identifying

C.

Sharing

D.

Restricting

Buy Now
Questions 111

You work as a CRO for uCertify Inc. You and your team are involved in the pre-assessment phase of the risk governance framework. One of your newly joined team member wants to know the steps involved in the pre-assessment phase. Choose and reorder the steps performed in the pre-assessment phase.

Options:

A.

Buy Now
Questions 112

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Human resource security

B.

Personal security

C.

Physical security

D.

Network Security

Buy Now
Questions 113

Which of the following defines the amount of data loss a business can endure?

Options:

A.

RTO

B.

RTA

C.

BCP

D.

RPO

Buy Now
Questions 114

You work as a Security Administrator for uCertify Inc. The organization has signed a legal contract with another company for maintaining network security. According to the contract, both companies can share any confidential material, knowledge, or information with one another for certain purposes, but they cannot share these with others. Which of the following terms best describes this agreement?

Options:

A.

Organizational Level

B.

Service Level

C.

Operating Level

D.

Non-disclosure

Buy Now
Questions 115

Which of the following statements is true about pattern matching IDS?

Options:

A.

IDS can match empty list only.

B.

IDS can only be effective unless the company's security policies are not defined and followed in practice.

C.

IDS can trigger only on signatures that are stored in the database of the IDS.

D.

IDS can detect only when an attacker is passively sniffing data.

Buy Now
Questions 116

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

Options:

A.

Developing risk management plan to identify risks based on documents

B.

Developing project charter and risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Identifying and analyzing risk events using qualitative and quantitative techniques

Buy Now
Questions 117

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where

significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Chosen-Stego Attack

B.

Active Attacks

C.

Stegdetect Attack

D.

Steg-Only Attack

Buy Now
Questions 118

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk avoidance

B.

Risk mitigation

C.

Risk transference

D.

Risk acceptance

Buy Now
Questions 119

Which of the following are the primary rules defined for RBAC?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Role authorization

B.

Transaction authorization

C.

Role assignment

D.

Transaction assignment

Buy Now
Questions 120

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:

A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Buy Now
Questions 121

You work as the project manager for Bluewell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decide, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project, what is

likely to increase?

Options:

A.

Human resource needs

B.

Risks

C.

Costs

D.

Quality control concerns

Buy Now
Questions 122

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

Options:

A.

System state data

B.

DNS record

C.

Users manual

D.

Cache memory

Buy Now
Questions 123

You work as an Information Security Manager for uCertify Inc. You are working on an asset management plan for protecting software tools used in your organization. Which of the following are included in Software Asset Management (SAM)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintaining software license compliance

B.

Tracking inventory and software asset use

C.

Maintaining standard policies and procedures

D.

Tracking issues related with IT equipment

Buy Now
Questions 124

Which of the following policies defines the acceptable methods of remotely connecting a system to the internal network?

Options:

A.

Remote access policy

B.

Computer security policy

C.

Network security policy

D.

User Account Policy

Buy Now
Questions 125

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Running applications back online

B.

Recovering data

C.

Fault detection

D.

Sales estimation

Buy Now
Questions 126

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Install the IAS server on the system to verify Internet related activities.

B.

Install the RADIUS server to check the authentication of the invader.

C.

Install the application that is designed to record the activities of the invader.

D.

Install the operating system without patches installed and use typical defaults and options.

Buy Now
Questions 127

Mark works as a Network Security Administrator for uCertify Inc. He has installed IDS for matching incoming packets against known attacks. Which of the following types of intrusion detection techniques is being used?

Options:

A.

Host-based IDS

B.

Signature-based IDS

C.

Pattern Matching IDS

D.

Network-based IDS

Buy Now
Questions 128

Which of the following is used to hide the existence of a message from a third party?

Options:

A.

Steganography

B.

SNORT

C.

Packet sniffing

D.

Spoofing

Buy Now
Questions 129

You work as a Security Administrator for uCertify Inc. You have been assigned a task for helping employees in determining appropriate technical security measures available for electronic information that is deemed sensitive. Which of the following policies will you apply to accomplish the task?

Options:

A.

Default policy

B.

Enterprise policy

C.

Information security policy

D.

Security policy

Buy Now
Questions 130

You work as a Network Security Administrator for uCertify Inc. Your organization has set up a new Internet connection in place of the previous one. It is your responsibility to ensure that employees use the Internet only for official purposes. While reviewing Internet usages, you find that a few people have traversed and downloaded some inappropriate and illegal information. You want to make a policy to stop all these activities in the future. Which of the following policies will you implement to accomplish the task?

Options:

A.

Security policy

B.

Privacy policy

C.

Acceptable use policy

D.

Due care policy

Buy Now
Questions 131

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Packet sniffing

B.

Spoofing

C.

Cryptanalysis

D.

Steganography

Buy Now
Questions 132

What is the name given to the system that guarantees the coherence of information security in the organization?

Options:

A.

Information Security Management System

B.

Rootkit

C.

Stemkit

D.

Security regulations for special information for the government

Buy Now
Questions 133

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:

A.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

D.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

Buy Now
Questions 134

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transference

Buy Now
Questions 135

Which of the following statements is true about exposure factor?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Sep 15, 2025
Questions: 453
$66  $164.99
$50  $124.99
$42  $104.99
buy now G2700