Pass the GIAC GIAC Certification G2700 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions
Questions # 81:

You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Centralized reporting for compliance adherence


B.

Reducing IT costs due to lower number of IT help desk calls about passwords


C.

Reduces phishing success, because users are not trained to enter password everywhere without thinking


D.

Reduces the user experience


Expert Solution
Questions # 82:

Which of the following are process elements for remote diagnostics?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

After detected performance degradation, predict the failure moment by extrapolation.


B.

Remotely monitor selected vital system parameters.


C.

Compare with known or expected behavior data.


D.

Perform analysis of data to detect trends.


Expert Solution
Questions # 83:

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

Options:

A.

Mandatory Access Control


B.

Task-based Access Control


C.

Discretionary Access Control


D.

Role-Based Access Control


Expert Solution
Questions # 84:

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Human resource security


B.

Personal security


C.

Physical security


D.

Network Security


Expert Solution
Questions # 85:

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:

A.

Deterrent control


B.

Application control


C.

Preventive control


D.

Detective control


Expert Solution
Questions # 86:

Which of the following is NOT a type of FMEA?

Options:

A.

BFMEA


B.

CFMEA


C.

DFMEA


D.

PFMEA


Expert Solution
Questions # 87:

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hybrid attack


B.

Brute Force attack


C.

Dictionary attack


D.

Rule based attack


Expert Solution
Questions # 88:

Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?


Expert Solution
Questions # 89:

Which of the following statements is true about Return On Investment?

Options:

A.

It is the profit achieved through realization of improvements.


B.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.


C.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.


D.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.


Expert Solution
Questions # 90:

Which of the following tools can be used to detect steganography?

Options:

A.

Dskprobe


B.

ImageHide


C.

Blindside


D.

Snow


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions