Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

Mark works as a System Administrator for uCertify Inc. He has recently installed freeware software from the Internet. He finds that the software displays some advertisements in a corner of the window. He notices that even when he is not downloading anything from the web, downloads are still increasing very frequently, despite the fact he is not using any web browser or Internet applications. After doing some research, Mark finds that the new software is downloading these files. Which of the following types of programs has Mark installed on his computer?

Options:

A.

Macro


B.

MBR


C.

Tarpit


D.

Adware


Expert Solution
Questions # 22:

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.


B.

It enables mass surveillance of communications in transit.


C.

It enables certain private bodies to demand that someone hand over keys to protected information.


D.

It allows certain public bodies to monitor people's Internet activities.


Expert Solution
Questions # 23:

Which of the following best describes the identification, analysis, and ranking of risks?

Options:

A.

Fixed-price contract


B.

Plan Risk management


C.

Fast tracking


D.

Design of experiments


Expert Solution
Questions # 24:

Gary is the project manager for his organization. He is working with the project stakeholders on the project requirements and how risks may affect their project. One of the stakeholders is confused about what constitutes risks in the project. Which of the following is the most accurate definition of a project risk?

Options:

A.

It is an uncertain event or condition within the project execution.


B.

It is an uncertain event that can affect at least one project objective.


C.

It is an unknown event that can affect the project scope.


D.

It is an uncertain event that can affect the project costs.


Expert Solution
Questions # 25:

Which of the following groupings is correct regarding security measures?

Options:

A.

Physical, logical, preventive, detective


B.

Preventive, detective, repressive, corrective


C.

Logical, repressive, preventive, corrective


D.

Organizational, preventive, corrective, physical


Expert Solution
Questions # 26:

Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Calculate


B.

Act


C.

Plan


D.

Deviate


Expert Solution
Questions # 27:

You work as a Security Administrator for uCertify Inc. You have made a plan to increase the security of the organization and you want to show this to the CEO of the organization. But, you do not want to share this information with others. Therefore, you want to classify this information.

Which of the following will be the suitable classification to accomplish the task?

Options:

A.

Private or confidential


B.

Management only


C.

Department specific


D.

Classified


Expert Solution
Questions # 28:

The guidelines that are defined in the ISO/IEC 27002:2005 standard deal with which of the following aspects of information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Procedural


B.

Situational


C.

Logical


D.

Physical


Expert Solution
Questions # 29:

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

Options:

A.

Data custodian


B.

User


C.

Auditor


D.

Data owner


Expert Solution
Questions # 30:

Which of the following are elements of an information security policy document?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Policy Text


B.

Policy scope


C.

Scope


D.

Sanctions


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions