Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions
Questions # 41:

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to assign ownership of some assets of the organization. Which of the following statements correctly describe the responsibilities of an asset owner?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The owner has property rights to the asset.


B.

The owner is allowed to delegate responsibility for maintaining the asset.


C.

The owner should have a document describing the security controls for the asset.


D.

The owner is allowed to delegate accountability of the asset.


Expert Solution
Questions # 42:

Fill in the blank with the appropriate term.

___________is the built-in file encryption tool for Windows file systems. It protects encrypted files from those who have physical possession of the computer where the encrypted files are stored.


Expert Solution
Questions # 43:

Sam is the CEO of Gentech Inc. The company is located in New York. He has to start a new project in order to increase the overall revenue of the company. Sam has to develop an ISMS policy. In which of the following phases of the PDCA cycle will Sam accomplish the task?

Options:

A.

Plan


B.

Do


C.

Check


D.

Act


Expert Solution
Questions # 44:

You work as a Security Administrator for uCertify Inc. You need to make a documentation to provide ongoing education and awareness training of disciplinary actions of your company. What are the primary reasons to create this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To ensure that employees understand information security threats


B.

To ensure that employees have the necessary knowledge to mitigate security threats


C.

To ensure that employees are aware of and understand their roles and responsibilities


D.

To ensure that employees have the necessary knowledge about the company's forthcoming Projects


Expert Solution
Questions # 45:

Business Continuity Planning (BCP) determines the risks to the organizational processes and creates policies, plans, and procedures in order to minimize the impact of those risks. What are the different steps in the Business Continuity Planning process?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Business Analysis


B.

Continuity planning


C.

Project scope and planning


D.

Approval and implementation


E.

Business Impact Assessment


Expert Solution
Questions # 46:

Which of the following are the factors that determine the degree to which the Return on Investment overstates the economic value?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Capitalization policy


B.

Growth rate of new investment


C.

Growth rate of old investment


D.

Length of project life


Expert Solution
Questions # 47:

You are working with a company that depends on real time data being available to employees, thus performance is an issue. They are trying to select the best method for handing the situation of a hard drive crashing. Which of the following would you recommend to them?

Options:

A.

RAID 2


B.

RAID 0


C.

RAID 1


D.

RAID 5


Expert Solution
Questions # 48:

Which of the following documents is developed along the risk management processes to monitor and control risks?

Options:

A.

Fault tree


B.

Risk mitigation


C.

Decision tree


D.

Risk register


Expert Solution
Questions # 49:

Which of the following is one of the mechanisms available for administrators to employ for replicating the databases containing the DNS data across a set of DNS servers?

Options:

A.

DNS zone transfer


B.

DNS cache poisoning


C.

DNS spoofing


D.

ARP spoofing


Expert Solution
Questions # 50:

Which of the following are the exceptions of the Data Protection Act?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Section 36 - Domestic purposes


B.

Section 28 - National security


C.

Section 55 - Unlawful obtaining of personal data


D.

Section 29 - Crime and taxation


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions