Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
Questions # 61:

John works as an IT Technician for uCertify Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

DoS


B.

Trojan horse


C.

Social engineering


D.

Replay attack


Expert Solution
Questions # 62:

Choose and reorder the appropriate steps that you will take to perform auditing.

Question # 62

Options:

A.

Expert Solution
Questions # 63:

Which of the following is a technical measure?

Options:

A.

Encryption of data


B.

Creation of a policy that defines what is and what is not permitted in the e-mail


C.

Allocation of information to an owner


D.

Storage of system management passwords


Expert Solution
Questions # 64:

You work as an Information Security Officer for uCertify Inc. You need to create an asset management plan differentiating fixed assets from inventory items. How will you differentiate assets from inventory items?

Options:

A.

Inventory items are sold.


B.

Assets are temporary usually.


C.

Inventory items are permanent.


D.

Assets cannot be used.


Expert Solution
Questions # 65:

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It backs up only the files changed since the most recent backup and clears the archive bit.


B.

It is the fastest method of backing up data.


C.

It is the slowest method for taking a data backup.


D.

It backs up the entire database, including the transaction log.


Expert Solution
Questions # 66:

Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Deviate


B.

Plan


C.

Calculate


D.

Act


Expert Solution
Questions # 67:

Which of the following statements describes the purpose of information security policy?

Options:

A.

The security policy makes the security plan flawless by providing the necessary details.


B.

The security policy provides direction and support to the management regarding information security.


C.

Analysis of risks and search for countermeasures are known as Policy Documents.


D.

The security policy provides details about threats and the consequences.


Expert Solution
Questions # 68:

You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.

Which of the following are the main objectives of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Minimal disruption of services


B.

Reduction of inventory in accordance with revenue


C.

Economic utilization of resources involved in the change


D.

Reduction in back-out activities


Expert Solution
Questions # 69:

Which of the following sections come under the ISO/IEC 27002 standard?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset management


B.

Security policy


C.

Financial assessment


D.

Risk assessment


Expert Solution
Questions # 70:

Which of the following can be protected by the RAID implementation?

Options:

A.

Disk failure


B.

Switch failure


C.

Host failure


D.

Network failure


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions