Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following elements of the PDCA (Plan-Do-Check-Act) methodology describes the objectives and processes required to deliver results according to the customer requirements and the organization's policies?

Options:

A.

Act


B.

Do


C.

Check


D.

Plan


Expert Solution
Questions # 2:

Which of the following utilize information system in order to recognize, control, and protect information or any equipment used?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Storage


B.

Processing


C.

Development


D.

Transmission


Expert Solution
Questions # 3:

Which of the following controls are related to Business Continuity and disaster recovery?

Options:

A.

Detective controls


B.

Preventive controls


C.

Corrective controls


D.

Recovery controls


Expert Solution
Questions # 4:

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Reverse social engineering attack


B.

Impersonation attack


C.

Important user posing attack


D.

In person attack


Expert Solution
Questions # 5:

You work as a Security Administrator for uCertify Inc. You are working on a disaster recovery plan. According to the plan, the remote site B will hold a copy of data that is 2 hours behind the production data at site A. It will take 4 hours after a downtime at site A to decide to shift production to site B. An additional 40 minutes will be needed to bring up the network and redirect users so that the site B can become productive. What is the RPO of the plan?

Options:

A.

2 hours


B.

50 minutes


C.

4 hours


D.

40 minutes


Expert Solution
Questions # 6:

Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

Options:

A.

Supply chain management


B.

Inventory management


C.

Information security management


D.

Change management


Expert Solution
Questions # 7:

Which of the following is the basic requirement to install WinDump on a Windows computer system?

Options:

A.

tcptrace


B.

WinPcap


C.

pcap


D.

EtherPeek


Expert Solution
Questions # 8:

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Viewing an e-mail message


B.

Updating windows files automatically


C.

Visiting a website


D.

Clicking on a deceptive pop-up window


Expert Solution
Questions # 9:

Which of the following Acts, enacted in the United States, amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

The USA Patriot Act of 2001


B.

Civil Rights Act of 1991


C.

Sexual Predators Act


D.

PROTECT Act


Expert Solution
Questions # 10:

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:

A.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)


B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)


C.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)


D.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions