Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions
Questions # 11:

In which of the following sections of the Computer Misuse Act 1990 are amendments made by Part 5 of the Police and Justice Act 2006?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Section 39


B.

Section 38


C.

Section 36


D.

Section 35


Expert Solution
Questions # 12:

Sam works as the Chief Information Security Officer for Blue Well Inc. There are a number of teams for the security purposes. Which of the following are the types of teams of which Sam can be a part of?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Computer Data Development Team


B.

Computer Security Incident Response Team


C.

Computer Information Development Team


D.

Computer Emergency Response Team


Expert Solution
Questions # 13:

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:

A.

Explicit Deny


B.

Implicit Allow


C.

ACL


D.

The principle of least privileges


Expert Solution
Questions # 14:

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to classify different information assets used in your organization. Which of the following should be the basis of your classification?

Options:

A.

Usage of the information for the organization


B.

Owner of the information


C.

Origin of the information


D.

Impact on the organization if information is disclosed


Expert Solution
Questions # 15:

Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?

Options:

A.

Use MIME.


B.

Use HTTP.


C.

Use SET.


D.

Use PGP.


Expert Solution
Questions # 16:

Which of the following is a technique for a threat which creates changes to the project management plan?

Options:

A.

Risk avoidance


B.

Risk mitigation


C.

Risk acceptance


D.

Risk transference


Expert Solution
Questions # 17:

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:

A.

ACL


B.

Explicit Deny


C.

The principle of least privileges


D.

Implicit Allow


Expert Solution
Questions # 18:

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

Options:

A.

Asset Value X Exposure Factor (EF)


B.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)


C.

Exposure Factor (EF)/Single Loss Expectancy (SLE)


D.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)


Expert Solution
Questions # 19:

Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical computer systems that are necessary to support business continuity. All these tiers provide a simple method to define current service levels and associated risks. Choose and re-order the tiers of disaster recovery plan.

Question # 19

Options:

A.

Expert Solution
Questions # 20:

You work as an Information Security Manager for uCertify Inc. You are implementing an asset management strategy. Which of the following should you include in your strategy to make it effective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Software assets


B.

Organization's reputation


C.

Outage duration


D.

IT equipment


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions