Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following operations are performed by the Identity Management Process?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Providing Single Sign-On access


B.

Making possible automated application provision


C.

Provisioning and coordinating user identities


D.

Ensuring secure deployment of applications


Expert Solution
Questions # 52:

Cigital Risk Management Method was developed by Gary McGraw of Cigital and John Viega of Stonewall Software, and it defines software security risk management process. Choose and re-order the risk management steps that are included in this method.

Question # 52

Options:

A.

Expert Solution
Questions # 53:

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A protocol analyzer can identify physical layer errors in a network switch.


B.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.


C.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.


D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.


Expert Solution
Questions # 54:

Which of the following is a process of identifying and documenting project roles, responsibilities, and reporting relationships?

Options:

A.

Capacity planning


B.

Enterprise resource planning


C.

Business Continuity planning


D.

Human resource planning


Expert Solution
Questions # 55:

Which of the following is the correct formula of single loss expectancy?

Options:

A.

SLE= Annualized rate of occurrence*exposure factor


B.

SLE=asset value*exposure factor


C.

SLE= exposure factor*exposure factor


D.

SLE= Annualized loss expectancy*exposure factor


Expert Solution
Questions # 56:

Which of the following types of social engineering attacks is a term that refers to going through someone's trash to find out useful or confidential information?

Options:

A.

Authorization by third party


B.

Dumpster diving


C.

Shoulder surfing


D.

Important user posing


Expert Solution
Questions # 57:

Which of the following plans provides measures and capabilities for recovering a major application or general support system?

Options:

A.

Disaster recovery plan


B.

Crisis communication plan


C.

Contingency plan


D.

Business continuity plan


Expert Solution
Questions # 58:

Which of the following states that a user should never be given more privileges than are required to carry out a task?

Options:

A.

Principle of least privilege


B.

Role-based security


C.

Security through obscurity


D.

Segregation of duties


Expert Solution
Questions # 59:

Which of the following tasks are performed by Information Security Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is designed to protect information and any equipment that is used in connection with its storage, transmission, and processing.


B.

It is designed to develop information and any equipment that is used in connection with its storage, transmission, and processing.


C.

It is designed to recognize information and any equipment that is used in connection with its storage, transmission, and processing.


D.

It is designed to control information and any equipment that is used in connection with its storage, transmission, and processing.


Expert Solution
Questions # 60:

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations management. Which of the following controls of the ISO standard is concerned with operational procedures and responsibilities?

Options:

A.

Control A.10.1


B.

Control A.7.1


C.

Control A.8.1


D.

Control A.9.2


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions