Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following is a legal system that gives great precedential weight to common law, on the principle that it is unfair to treat similar facts differently on different occasions?

Options:

A.

Religious law


B.

Common law


C.

Civil law


D.

Customary law


Expert Solution
Questions # 72:

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk transference


B.

Risk acceptance


C.

Risk avoidance


D.

Risk mitigation


Expert Solution
Questions # 73:

Mark works as a Data Center Manager for TechNet Inc. A few days ago, he published a blog about himself during his working hours. However, as per the organization's policy, any member of the organization cannot use any resources of the organization for his personal use. Since Mark has violated the policy, he should go to an internal committee and be informed of his rights in the matter. Which of the following practices is being implemented?

Options:

A.

Due process


B.

Integrity Management Consulting


C.

Due diligence


D.

Due care


Expert Solution
Questions # 74:

You work as a Security Administrator for uCertify Inc. You have been assigned a task to provide a solution that has a striped set with distributed parity or interleave parity. Which of the following will help you to meet the organizational requirements?

Options:

A.

RAID 3/4


B.

RAID 0


C.

RAID 10


D.

RAID 5


Expert Solution
Questions # 75:

Which of the following are the various types of security measures?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Reductive


B.

Preventive


C.

Quantitative


D.

Qualitative


Expert Solution
Questions # 76:

Which of the following statements is related to residual risks?

Options:

A.

It can be considered as an indicator of threats coupled with vulnerability.


B.

It is the probabilistic risk before implementing all security measures.


C.

It is a weakness or lack of safeguard that can be exploited by a threat.


D.

It is the probabilistic risk after implementing all security measures.


Expert Solution
Questions # 77:

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of ISMS. Which of the following steps are concerned with the development of ISMS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk management


B.

Selection of appropriate controls


C.

HR security planning


D.

Statement of Applicability


Expert Solution
Questions # 78:

Which of the following protects original works of authorship including literary, dramatic, musical, artistic, and other intellectual works?

Options:

A.

Criminal law


B.

Civil law


C.

Copyright law


D.

Administrative law


Expert Solution
Questions # 79:

Which of the following surveys found that the smaller organizations had had a better understanding of their information assets?

Options:

A.

DTI Survey


B.

CBI Cyber Crime Survey


C.

Information Security Breaches Survey (ISBS) 2006


D.

KPMG's Information Security Survey 2000


Expert Solution
Questions # 80:

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You are making the documentation on control A.7.2. Which of the following are the main objectives of control A.7.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using


B.

Identifying


C.

Sharing


D.

Restricting


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions