Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 10 out of 14 pages
Viewing questions 91-100 out of questions
Questions # 91:

Sam works as the Security Administrator for Blue Well Inc. He has to develop controls as the countermeasures to risks. Which of the following are the types of controls that Sam may employ for security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Transitive


B.

Corrective


C.

Preventive


D.

Detective


Expert Solution
Questions # 92:

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Uptime


B.

Slowtime


C.

Downtime


D.

Peaktime


Expert Solution
Questions # 93:

Which of the following specifies value of each asset?

Options:

A.

Asset importance


B.

Asset protection


C.

Asset responsibility


D.

Asset identification


Expert Solution
Questions # 94:

Which of the following refers to the process of adjusting the capacity of a company to meet the changed or predicted demands?

Options:

A.

Business continuity planning


B.

Capacity planning


C.

DR planning


D.

ER planning


Expert Solution
Questions # 95:

Which of the following are process elements for remote diagnostics?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Compare with known or expected behavior data.


B.

Perform analysis of data to detect trends.


C.

After detected performance degradation, predict the failure moment by extrapolation.


D.

Remotely monitor selected vital system parameters.


Expert Solution
Questions # 96:

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory?

Options:

A.

Ping of death


B.

Self-modifying code


C.

Heap overflow


D.

Buffer overflow


Expert Solution
Questions # 97:

You work as a Security Administrator for uCertify Inc. The organization has signed a legal contract with another company for maintaining network security. According to the contract, both companies can share any confidential material, knowledge, or information with one another for certain purposes, but they cannot share these with others. Which of the following terms best describes this agreement?

Options:

A.

Organizational Level


B.

Service Level


C.

Operating Level


D.

Non-disclosure


Expert Solution
Questions # 98:

How many modules are there in FaultTree+?

Options:

A.

6


B.

5


C.

3


D.

4


Expert Solution
Questions # 99:

Who of the following receive reports after the Check phase of the PDCA model is completed?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security Officer


B.

Management


C.

CEO


D.

Chief Information Security Officer


Expert Solution
Questions # 100:

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory?

Options:

A.

Self-modifying code


B.

Heap overflow


C.

Buffer overflow


D.

Ping of death


Expert Solution
Viewing page 10 out of 14 pages
Viewing questions 91-100 out of questions