Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

G2700 GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Questions 4

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

Buy Now
Questions 5

You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Improved productivity of users due to more stable and better IT services

B.

Improved IT personnel productivity, since there is a reduced number of urgent changes and a back-out of erroneous changes

C.

Improved adverse impact of changes on the quality of IT services

D.

Increased ability to absorb frequent changes without making an unstable IT environment

Buy Now
Questions 6

You work as an Information Security Officer for uCertify Inc. You need to create an asset management plan differentiating fixed assets from inventory items. How will you differentiate assets from inventory items?

Options:

A.

Inventory items are sold.

B.

Assets are temporary usually.

C.

Inventory items are permanent.

D.

Assets cannot be used.

Buy Now
Questions 7

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

Options:

A.

Data owner

B.

Data custodian

C.

Auditor

D.

User

Buy Now
Questions 8

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are considered as an indicator of threats coupled with vulnerability.

B.

These can be removed completely by taking proper actions.

C.

These can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

These can be analyzed and measured by the risk analysis process.

Buy Now
Questions 9

Qualitative risk analysis includes judgment, intuition, and experience. Which of the following methods are used to perform qualitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Egress filtering

B.

Checklists

C.

Delphi technique

D.

Brainstorming

Buy Now
Questions 10

Which of the following is a formal state transition model of computer security policy that is used to describe a set of access control rules which use security labels on objects and clearances for subjects?

Options:

A.

Five Pillars model

B.

Classic information security model

C.

Bell-LaPadula model

D.

Clark-Wilson integrity model

Buy Now
Questions 11

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:

A.

RAID-1

B.

RAID-5

C.

RAID-4

D.

RAID-3

E.

RAID-0

Buy Now
Questions 12

Single Loss Expectancy (SLE) represents an organization ' s loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Options:

A.

SLE = Asset Value (AV) * Exposure Factor (EF)

B.

SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

C.

SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)

D.

SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

Buy Now
Questions 13

Which of the following international information security standards is concerned with anticipating and responding to information security breaches?

Options:

A.

Organization of information security

B.

Information security incident management

C.

Physical and environmental security

D.

Risk assessment and treatment

Buy Now
Questions 14

Which of the following is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients?

Options:

A.

BGP

B.

SMTP

C.

CHAP

D.

DHCP

Buy Now
Questions 15

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User manuals

B.

Operating systems

C.

Training metarials

D.

Personal data

Buy Now
Questions 16

Which of the following plans provides measures and capabilities for recovering a major application or general support system?

Options:

A.

Disaster recovery plan

B.

Crisis communication plan

C.

Contingency plan

D.

Business continuity plan

Buy Now
Questions 17

Which of the following provides secure online payment services?

Options:

A.

ACH

B.

ICSA

C.

CA

D.

IEEE

Buy Now
Questions 18

Choose and reorder the appropriate steps that you will take to perform auditing.

G2700 Question 18

Options:

A.
Buy Now
Questions 19

Which of the following controls are administrative in nature?

Options:

A.

Directive controls

B.

Recovery controls

C.

Preventive controls

D.

Detective controls

Buy Now
Questions 20

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer ' s boundary and overwrites adjacent memory?

Options:

A.

Ping of death

B.

Self-modifying code

C.

Heap overflow

D.

Buffer overflow

Buy Now
Questions 21

Which of the following are computer clusters that are implemented primarily for the purpose of providing high availability of services which the cluster provides?

Options:

A.

High-availability clusters

B.

Globular clusters

C.

Load balancing clusters

D.

Tightly-coupled compute clusters

Buy Now
Questions 22

Which of the following defines the amount of data loss a business can endure?

Options:

A.

RTO

B.

RTA

C.

BCP

D.

RPO

Buy Now
Questions 23

Victor wants to send an encrypted message to his friend. He is using a steganography technique to accomplish his task. He takes a cover object and changes it accordingly to hide information.

This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following steganography methods is Victor using to accomplish his task?

Options:

A.

The distortion technique

B.

The substitution technique

C.

The cover generation technique

D.

The spread spectrum technique

Buy Now
Questions 24

Which of the following is the designing phase of the ISMS?

Options:

A.

Check

B.

Plan

C.

Act

D.

Do

Buy Now
Questions 25

Which of the following is a fast-emerging global sector that advises individuals and corporations on how to apply the highest ethical standards to every aspect of their business?

Options:

A.

Service Capacity Management (SCM)

B.

Business Capacity Management (BCM)

C.

Resource Capacity Management (RCM)

D.

Integrity Management Consulting

Buy Now
Questions 26

You work as a Network Security Administrator for uCertify Inc. You feel that someone has accessed your computer and used your e-mail account. To check whether there is any virus installed into your computer, you scan your computer but do not find any illegal software. Which of the following types of security attacks generally runs behind the scenes on your computer?

Options:

A.

Zero-day

B.

Rootkit

C.

Hybrid

D.

Replay

Buy Now
Questions 27

You work as a Security Administrator for uCertify Inc. You are concerned about the password security. Therefore, you have decided to apply a policy that will be helpful for others to create strong passwords. Which of the following are the important things that should be remembered to create a strong password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It should be of eight characters.

B.

It should be a known word.

C.

It should contain at least one number or punctuation character.

D.

It should contain at least one capital letter.

Buy Now
Questions 28

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts. There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

Options:

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a policy to enter their personal email id while logged in to the system.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a new policy that forces users to change their passwords once every 15 days.

Buy Now
Questions 29

You work as a Network Security Administrator for uCertify Inc. Your organization has set up a new Internet connection in place of the previous one. It is your responsibility to ensure that employees use the Internet only for official purposes. While reviewing Internet usages, you find that a few people have traversed and downloaded some inappropriate and illegal information. You want to make a policy to stop all these activities in the future. Which of the following policies will you implement to accomplish the task?

Options:

A.

Security policy

B.

Privacy policy

C.

Acceptable use policy

D.

Due care policy

Buy Now
Questions 30

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:

A.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

D.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

Buy Now
Questions 31

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Packet sniffing

B.

Spoofing

C.

Cryptanalysis

D.

Steganography

Buy Now
Questions 32

Which of the following statements is true about residual risks?

Options:

A.

It is a weakness or lack of safeguard that can be exploited by a threat.

B.

It is the probabilistic risk after implementing all security measures.

C.

It can be considered as an indicator of threats coupled with vulnerability.

D.

It is the probabilistic risk before implementing all security measures.

Buy Now
Questions 33

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk avoidance

B.

Risk mitigation

C.

Risk transference

D.

Risk acceptance

Buy Now
Questions 34

You work as a Security Administrator for uCertify Inc. You have been assigned the task to apply a data availability solution based on a striped disk array without redundancy. Which of the following will you use to accomplish the task?

Options:

A.

RAID 5

B.

RAID 0

C.

RAID 1

D.

RAID 3/4

Buy Now
Questions 35

Which of the following policies is a set of rules applied by the owner/manager of a network, Website or large computer system that restrict the ways in which the network site or system may be used?

Options:

A.

Default policy

B.

Certificate policy

C.

Informative policy

D.

Acceptable use policy

Buy Now
Questions 36

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Running applications back online

B.

Recovering data

C.

Fault detection

D.

Sales estimation

Buy Now
Questions 37

David works as the Chief Information Security Officer for uCertify Inc. Which of the following are the responsibilities that should be handled by David?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Information development

B.

Information risk management

C.

Information privacy

D.

Information security

Buy Now
Questions 38

Which of the following are the primary rules defined for RBAC?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Transaction authorization

B.

Role authorization

C.

Role assignment

D.

Transaction assignment

Buy Now
Questions 39

Which of the following are the various domains in the ISO/IEC 27002?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Management policy

B.

Security policy

C.

Access security

D.

Compliance

Buy Now
Questions 40

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn ' t know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

Options:

A.

Brute Force attack

B.

War dialing attack

C.

Social Engineering attack

D.

Replay attack

Buy Now
Questions 41

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Personal security

B.

Network Security

C.

Physical security

D.

Human resource security

Buy Now
Questions 42

What is the name given to the system that guarantees the coherence of information security in the organization?

Options:

A.

Information Security Management System

B.

Rootkit

C.

Stemkit

D.

Security regulations for special information for the government

Buy Now
Questions 43

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

B.

A protocol analyzer can identify physical layer errors in a network switch.

C.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Buy Now
Questions 44

Which of the following are responsibilities of the Service Level Manager?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To define Service Level Agreement

B.

To define the Service Level Agreement structure

C.

To define the Underpinning Contracts (UC) with external providers

D.

To define the Operational Level Agreements with internal providers

Buy Now
Questions 45

Which of the following activities are performed by the ' Do ' cycle component of PDCA (plan-docheck- act)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It manages resources that are required to achieve a goal.

B.

It determines controls and their objectives.

C.

It performs security awareness training.

D.

It detects and responds to incidents properly.

E.

It operates the selected controls.

Buy Now
Questions 46

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to

submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset Value

B.

Single Loss Expectancy

C.

Annualized Rate of Occurrence

D.

Number of employees in the company

Buy Now
Questions 47

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark ' s financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Privacy law

B.

Copyright law

C.

Security law

D.

Trademark law

Buy Now
Questions 48

Sam is the CEO of Gentech Inc. The company is located in New York. He has to start a new project in order to increase the overall revenue of the company. Sam has to develop an ISMS policy. In which of the following phases of the PDCA cycle will Sam accomplish the task?

Options:

A.

Do

B.

Plan

C.

Act

D.

Check

Buy Now
Questions 49

You work as a System Administrator for uCertify Inc. You have been given the task to create a new corporate policy. Which of the following approaches must be followed to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strategic approach

B.

Approach to Risk Management

C.

Clear and unambiguous approach

D.

Industry best practice

Buy Now
Questions 50

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Technical steganography

C.

Perceptual masking

D.

Text Semagrams

Buy Now
Questions 51

You work as a Security Administrator for uCertify Inc. You have been assigned a task for helping employees in determining appropriate technical security measures available for electronic information that is deemed sensitive. Which of the following policies will you apply to accomplish the task?

Options:

A.

Default policy

B.

Enterprise policy

C.

Information security policy

D.

Security policy

Buy Now
Questions 52

Which of the following paragraphs of the Turnbull Report stated that a company ' s system of internal control will include information and communication processes?

Options:

A.

Paragraph 28

B.

Paragraph 20

C.

Paragraph 21

D.

Paragraph 22

Buy Now
Questions 53

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the classification of information assets. Which of the following controls of the ISO standard provides guidelines on the classification of information?

Options:

A.

Control A.7.1.3

B.

Control A.7.1.2

C.

Control A.7.2

D.

Control A.7.2.1

Buy Now
Questions 54

As an attacker, you are sending very small sized packets with durations of 15 minutes per packet to the IIS Web server. Since an IIS session remains alive for a long time, the IDS may be tricked into accepting them as regular packet transformations. Which of the following types of attacking methods are you using?

Options:

A.

Session splicing

B.

Nonblind spoofing

C.

Session hijacking

D.

Security Logging

Buy Now
Questions 55

In which of the following social engineering attacks does an attacker first damage any part of the target ' s equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Impersonation attack

B.

Reverse social engineering attack

C.

Important user posing attack

D.

In person attack

Buy Now
Questions 56

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

Options:

A.

Equipment

B.

Electricity

C.

Reputation of the company

D.

Personal data

Buy Now
Questions 57

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

Options:

A.

System state data

B.

DNS record

C.

Users manual

D.

Cache memory

Buy Now
Questions 58

Which of the following statements is true about annualized rate of occurrence?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Buy Now
Questions 59

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Account lockout policy

B.

Chain of custody

C.

Incident response policy

D.

Separation of duties

Buy Now
Questions 60

Which of the following are the elements of Information Security Management System framework?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Implement

B.

Reset

C.

Plan

D.

Control

Buy Now
Questions 61

Which of the following standards was concerned with corporate governance and directors ' remuneration and issued in 1998?

Options:

A.

ISO 27001

B.

Combined Code

C.

Turnbull Report

D.

Sarbanes-Oxley Act

Buy Now
Questions 62

You work as a Security Administrator for uCertify Inc. You have been assigned the task to provide a solution based on high reliability combined with high performance. Which of the following will you use to accomplish the task?

Options:

A.

RAID 10

B.

RAID 5

C.

RAID 0

D.

RAID 1

Buy Now
Questions 63

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

Options:

A.

Personal data

B.

Electricity

C.

Reputation of the company

D.

Equipment

Buy Now
Questions 64

David has identified a technical risk in his project and has been assigned a contingency for that. Which part of the risk response strategy does planning contingency reserves come under?

Options:

A.

Active risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Passive risk acceptance

Buy Now
Questions 65

Which of the following identifies a company ' s exposure to threats and provides effective prevention and recovery for the company?

Options:

A.

Business Delegate

B.

Business impact assessment

C.

Business continuity planning

D.

Business intelligence

Buy Now
Questions 66

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after computer crime investigations in the United States?

Options:

A.

Local or National office of the US secret service

B.

National Institute of Standards and Technology

C.

Federal Bureau of Investigation

D.

Incident response team

Buy Now
Questions 67

You work as an Information Security Officer. You are working on an asset management plan. You need to assign ownership of some assets to an employee. You are making a documentation to explain the responsibilities of an owner of the business asset. Which of the following areas should you include in your documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Revenue tracking

B.

Management

C.

Development

D.

Production

E.

Security

Buy Now
Questions 68

Which of the following are elements of an information security policy document?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Policy Text

B.

Policy scope

C.

Scope

D.

Sanctions

Buy Now
Questions 69

Which of the following are social engineering techniques?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Pretexting

B.

Phishing

C.

Baiting

D.

Salami attack

Buy Now
Questions 70

Which of the following plans provides measures for disseminating status report to personnel and the public?

Options:

A.

Contingency plan

B.

Disaster recovery plan

C.

Business continuity plan

D.

Crisis communication plan

Buy Now
Questions 71

Which of the following groupings is correct regarding security measures?

Options:

A.

Physical, logical, preventive, detective

B.

Organizational, preventive, corrective, physical

C.

Preventive, detective, repressive, corrective

D.

Logical, repressive, preventive, corrective

Buy Now
Questions 72

Which of the following is used for improving the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation?

Options:

A.

CBAC

B.

MAC

C.

UAC

D.

Implicit deny

Buy Now
Questions 73

Which of the following best describes the identification, analysis, and ranking of risks?

Options:

A.

Fixed-price contract

B.

Plan Risk management

C.

Fast tracking

D.

Design of experiments

Buy Now
Questions 74

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

Options:

A.

Identifying and analyzing risk events using qualitative and quantitative techniques

B.

Developing risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Developing project charter and risk management plan to identify risks based on documents

Buy Now
Questions 75

You work as a Security Administrator for uCertify Inc. You have made a plan to increase the security of the organization and you want to show this to the CEO of the organization. But, you do not want to share this information with others. Therefore, you want to classify this information.

Which of the following will be the suitable classification to accomplish the task?

Options:

A.

Private or confidential

B.

Management only

C.

Department specific

D.

Classified

Buy Now
Questions 76

Which of the following Acts, enacted in the United States, amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

The USA Patriot Act of 2001

B.

Civil Rights Act of 1991

C.

Sexual Predators Act

D.

PROTECT Act

Buy Now
Questions 77

For which of the following can risk analysis be used?

Options:

A.

Reducing risks to an acceptable level in conjunction with security measures

B.

Expressing the value of information for an organization in terms of money

C.

Ensuring that security measures are deployed in a cost-effective fashion

D.

Clarifying management about their responsibilities

Buy Now
Questions 78

Which of the following security design principles supports comprehensive and simple design and implementation of protection mechanisms, so that an unintended access path does not exist or can be readily identified and eliminated?

Options:

A.

Psychological acceptability

B.

Separation of duties

C.

Economy of mechanism

D.

Least privilege

Buy Now
Questions 79

Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

Options:

A.

Supply chain management

B.

Inventory management

C.

Information security management

D.

Change management

Buy Now
Questions 80

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

Options:

A.

ALE=asset value ($)/exposure factor (EF)

B.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

C.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

D.

ALE=asset value ($)*exposure factor (EF)

Buy Now
Questions 81

Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?

Options:

A.

Use MIME.

B.

Use HTTP.

C.

Use SET.

D.

Use PGP.

Buy Now
Questions 82

Fill in the blank with the appropriate term.

______is the process of managing user authorizations based on the ITU-T Recommendation X.509.

Options:

Buy Now
Questions 83

You work as a Network Security Administrator for uCertify Inc. You feel that someone has accessed your computer and used your e-mail account. To check whether there is any virus installed into your computer, you scan your computer but do not find any illegal software. Which of the following types of security attacks generally runs behind the scenes on your computer?

Options:

A.

Zero-day

B.

Rootkit

C.

Replay

D.

Hybrid

Buy Now
Questions 84

Which of the following is the basic requirement to install WinDump on a Windows computer system?

Options:

A.

tcptrace

B.

WinPcap

C.

pcap

D.

EtherPeek

Buy Now
Questions 85

Which of the following is the prime concern of ISO 27005?

Options:

A.

Asset Management

B.

Human resource security

C.

Information security risk management

D.

DR planning

Buy Now
Questions 86

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Annualized Rate of Occurrence

B.

Number of employees in the company

C.

Single Loss Expectancy

D.

Asset Value

Buy Now
Questions 87

What are the basic steps involved in Continuity Management?

1. Prioritizing the businesses to be recovered by conducting a Business Impact Analysis (BIA).

2. Performing a Risk Assessment (aka Risk Analysis) for each of the IT Services to identify the assets, threats, vulnerabilities, and countermeasures for each service.

3. Evaluating the options for recovery.

4. Producing the Contingency Plan.

5. Testing, reviewing, and revising the plan on a regular basis.

Each correct answer represents a complete solution. Choose two.

Options:

A.

1, 3, and 5 only

B.

1, 2, 3, 4, and 5

C.

3, 4, and 5 only

D.

1, 2, and 5 only

E.

2, 3, and 4

Buy Now
Questions 88

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

Options:

A.

Asset Value X Exposure Factor (EF)

B.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)

C.

Exposure Factor (EF)/Single Loss Expectancy (SLE)

D.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

Buy Now
Questions 89

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following elements are included in ISMS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Implement

B.

Plan

C.

Evaluation

D.

Encrypt

Buy Now
Questions 90

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to list down all procedures included in control A.7.2.2 of the ISO standard. Which of the following procedures are included in control A.7.2.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Storage

B.

Encryption

C.

Destruction

D.

Acquisition of information

Buy Now
Questions 91

Which of the following concepts or terms states that changes related to one requirement, i.e., scope, time, or cost, will at least influence one other element?

Options:

A.

Triple theory estimation

B.

Triple point theory

C.

Triple point estimation

D.

Triple constraint

Buy Now
Questions 92

Which of the following are the purposes of security awareness, training, and education?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Improve awareness of the need to protect system resources.

B.

Make computer system users aware of their security responsibilities and teaching them correct practices, which helps users change their behavior.

C.

Enhance the skills and knowledge so that the computer users can perform their jobs more securely.

D.

Construct in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems.

Buy Now
Questions 93

Which of the following types of software is used by organizations to arrange for different passwords on different systems to have the same value when they belong to the same person?

Options:

A.

Self-service password reset software

B.

Web single signon software

C.

Password synchronization software

D.

Enterprise Single signon software

Buy Now
Questions 94

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer ' s boundary and overwrites adjacent memory?

Options:

A.

Self-modifying code

B.

Heap overflow

C.

Buffer overflow

D.

Ping of death

Buy Now
Questions 95

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You are making the documentation on control A.7.2. Which of the following are the main objectives of control A.7.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using

B.

Identifying

C.

Sharing

D.

Restricting

Buy Now
Questions 96

Which of the following are security design principles required for information protection?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Closed design

B.

Least privilege

C.

Separation of duties

D.

Complete meditation

Buy Now
Questions 97

Single Loss Expectancy (SLE) represents an organization ' s loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Options:

A.

SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

B.

SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

C.

SLE = Asset Value (AV) * Exposure Factor (EF)

D.

SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence

Buy Now
Questions 98

Which of the following statements is true about Return On Investment?

Options:

A.

It is the profit achieved through realization of improvements.

B.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

C.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

D.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

Buy Now
Questions 99

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after computer crime investigations in the United States?

Options:

A.

National Institute of Standards and Technology

B.

Federal Bureau of Investigation

C.

Local or National office of the US secret service

D.

Incident response team

Buy Now
Questions 100

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Text Semagrams

B.

Technical steganography

C.

Linguistic steganography

D.

Perceptual masking

Buy Now
Questions 101

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Human resource security deals with the employees handling personal data in an organization. Which section of ISO 27002 describes human resource security?

Options:

A.

Section 4

B.

Section 8

C.

Section 3

D.

Section 5

Buy Now
Questions 102

Which of the following is an example of a corrective measure?

Options:

A.

To install a virus scanner

B.

To make a backup of the data that has been created or altered

C.

To restore a backup of the correct database

D.

To incorporate an Intrusion Detection System

Buy Now
Questions 103

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?

Options:

A.

Disaster Recovery Plan

B.

Cyber Incident Response Plan

C.

Occupant Emergency Plan

D.

Crisis Communication Plan

Buy Now
Questions 104

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee ' s verification in the organization?

Options:

A.

Access security

B.

Human resource security

C.

Physical security

D.

Network Security

Buy Now
Questions 105

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

Options:

A.

Sharpen

B.

Rotate

C.

Blur

D.

Soften

Buy Now
Questions 106

In which year was the Turnbull report published?

Options:

A.

2005

B.

2000

C.

1999

D.

1992

Buy Now
Questions 107

How many modules are there in FaultTree+?

Options:

A.

6

B.

5

C.

3

D.

4

Buy Now
Questions 108

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

Options:

A.

An organization should implement and maintain IDS to manage risks to the network.

B.

An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

C.

An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

D.

An organization should apply encryption to its information assets.

Buy Now
Questions 109

Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?

Options:

Buy Now
Questions 110

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of ISMS. Which of the following steps are concerned with the development of ISMS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk management

B.

Selection of appropriate controls

C.

HR security planning

D.

Statement of Applicability

Buy Now
Questions 111

Which of the following states that a user should never be given more privileges than are required to carry out a task?

Options:

A.

Principle of least privilege

B.

Segregation of duties

C.

Security through obscurity

D.

Role-based security

Buy Now
Questions 112

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Downtime

B.

Uptime

C.

Slowtime

D.

Peaktime

Buy Now
Questions 113

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

Options:

A.

Role-Based Access Control

B.

Task-based Access Control

C.

Discretionary Access Control

D.

Mandatory Access Control

Buy Now
Questions 114

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Install the IAS server on the system to verify Internet related activities.

B.

Install the operating system without patches installed and use typical defaults and options.

C.

Install the application that is designed to record the activities of the invader.

D.

Install the RADIUS server to check the authentication of the invader.

Buy Now
Questions 115

Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?

Options:

A.

Business Impact Analysis (BIA)

B.

Continual Service Improvement (CSI)

C.

Recovery Point Objective (RPO)

D.

Business Continuity Plan (BCP)

Buy Now
Questions 116

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:

A.

Deterrent control

B.

Application control

C.

Preventive control

D.

Detective control

Buy Now
Questions 117

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

Options:

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

Buy Now
Questions 118

Which of the following are computer clusters that are implemented primarily for the purpose of providing high availability of services which the cluster provides?

Options:

A.

Load balancing clusters

B.

Globular clusters

C.

Tightly-coupled compute clusters

D.

High-availability clusters

Buy Now
Questions 119

Which of the following is a legal system that gives great precedential weight to common law, on the principle that it is unfair to treat similar facts differently on different occasions?

Options:

A.

Religious law

B.

Common law

C.

Civil law

D.

Customary law

Buy Now
Questions 120

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Human resource security

B.

Personal security

C.

Physical security

D.

Network Security

Buy Now
Questions 121

Which of the following tools can be used to detect steganography?

Options:

A.

Dskprobe

B.

ImageHide

C.

Blindside

D.

Snow

Buy Now
Questions 122

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:

A.

Deterrent control

B.

Detective control

C.

Preventive control

D.

Application control

Buy Now
Questions 123

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

Options:

A.

Risk avoidance

B.

Risk transference

C.

Risk mitigation

D.

Risk acceptance

Buy Now
Questions 124

Which of the following sections come under the ISO/IEC 27002 standard?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset management

B.

Security policy

C.

Financial assessment

D.

Risk assessment

Buy Now
Questions 125

Fill in the blank with an appropriate phrase.

_________accord describes the minimum regulatory capital to be allocated by each bank based on its risk profile of assets.

Options:

Buy Now
Questions 126

In which of the following does CRAMM provide assistance?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Audits

B.

Contingency planning

C.

US7799 certification

D.

BS7799 certification

Buy Now
Questions 127

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations management. Which of the following controls of the ISO standard is concerned with operational procedures and responsibilities?

Options:

A.

Control A.10.1

B.

Control A.7.1

C.

Control A.8.1

D.

Control A.9.2

Buy Now
Questions 128

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

Options:

A.

Carry out a risk analysis.

B.

Formulate information security policy.

C.

Set up monitoring.

D.

Carry out an evaluation.

Buy Now
Questions 129

Which of the following are the sub-elements of environmental security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To prevent or respond to environmentally caused conflicts

B.

To protect and assist environment from a material ' s potential

C.

To prevent or repair military damage to the environment

D.

To protect the environment due to its inherent moral value

Buy Now
Questions 130

Which of the following is the process of removing sensitive information from a document or any other medium, so that it may be distributed to a broader audience?

Options:

A.

Sanitization

B.

Censorship

C.

Pixelization

D.

Data remanence

Buy Now
Questions 131

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts.

There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

Options:

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a new policy that forces users to change their passwords once every 15 days.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a policy to enter their personal email id while logged in to the system.

Buy Now
Questions 132

John works as an IT Technician for uCertify Inc. One morning, John receives an e-mail from the company ' s Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

DoS

B.

Trojan horse

C.

Social engineering

D.

Replay attack

Buy Now
Questions 133

Which of the following is a Restrict Anonymous registry value that allows users with explicit anonymous permissions?

Options:

A.

2

B.

3

C.

1

D.

0

Buy Now
Questions 134

You work as the Human Resource Manager for uCertify Inc. You need to recruit some candidates for the marketing department of the organization. Which of the following should be defined to the new employees of the organization before they have joined?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Marketing tips and tricks

B.

Organization ' s network topology

C.

Job roles

D.

Organization ' s security policy

Buy Now
Questions 135

Which of the following are the perspectives considered to ensure the confidentiality, integrity, and availability of an organization ' s assets, information, data, and IT services?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Procedural

B.

Technical

C.

Management

D.

Organizational

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Apr 30, 2026
Questions: 453

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now G2700 testing engine

PDF (Q&A)

$43.57  $124.49
buy now G2700 pdf