Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

GIAC G2700 GIAC Certified ISO-2700 Specialist Practice Test Exam Practice Test

Page: 1 / 45
Total 453 questions

GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which of the following can be protected by the RAID implementation?

Options:

A.

Disk failure

B.

Switch failure

C.

Host failure

D.

Network failure

Question 2

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Human resource security

B.

Personal security

C.

Physical security

D.

Network Security

Question 3

You work as an HR Manager for uCertify Inc. You are working on a checklist to develop an orderly exit process for the employees leaving your company. Which of the following actions should be included in that checklist?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To ensure that assets return in an expedited time frame

B.

To ensure that employees' access is removed

C.

To validate the references and the level of background checks

D.

To ensure that employees understand information security threats

Question 4

Which of the following statements is true about Return On Investment?

Options:

A.

It is the profit achieved through realization of improvements.

B.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

C.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

D.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

Question 5

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You are making the documentation on control A.7.2. Which of the following are the main objectives of control A.7.2?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using

B.

Identifying

C.

Sharing

D.

Restricting

Question 6

Which of the following refers to the process of adjusting the capacity of a company to meet the changed or predicted demands?

Options:

A.

Business continuity planning

B.

Capacity planning

C.

DR planning

D.

ER planning

Question 7

Who of the following receive reports after the Check phase of the PDCA model is completed?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security Officer

B.

Management

C.

CEO

D.

Chief Information Security Officer

Question 8

You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Improved adverse impact of changes on the quality of IT services

B.

Improved IT personnel productivity, since there is a reduced number of urgent changes and a back-out of erroneous changes

C.

Improved productivity of users due to more stable and better IT services

D.

Increased ability to absorb frequent changes without making an unstable IT environment

Question 9

Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?

Options:

A.

Business Impact Analysis (BIA)

B.

Continual Service Improvement (CSI)

C.

Recovery Point Objective (RPO)

D.

Business Continuity Plan (BCP)

Question 10

Sam is one of the four network administrators in Blue Well Inc. They have been assigned together the task to implement PDCA on the project. Sam has to work on the Plan stage of the project. Which of the following tasks should be performed by Sam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Preparing a statement of applicability

B.

Defining the scope of ISMS

C.

Defining the information security policy

D.

Managing operations and resources

Question 11

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Text Semagrams

B.

Technical steganography

C.

Linguistic steganography

D.

Perceptual masking

Question 12

You work as an Information Security Manager for uCertify Inc. The company is releasing the documentation about a software product. You have been assigned the task to include information about the company in a legal disclaimer before releasing the documentation. What is the purpose of using the legal disclaimer?

Options:

A.

To advertise the product

B.

To identify the usage of the documentation

C.

To protect organizations against libel actions

D.

To ensure the security of the documentation

Question 13

You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Centralized reporting for compliance adherence

B.

Reducing IT costs due to lower number of IT help desk calls about passwords

C.

Reduces phishing success, because users are not trained to enter password everywhere without thinking

D.

Reduces the user experience

Question 14

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to create a document following the Business Model of information security to provide guidelines for information assets. Which of the following are the elements of the Business Model for information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Process

B.

Technology

C.

People

D.

Training

E.

Organization Design and Strategy

Question 15

Which of the following are steps of vulnerability management programs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Prioritize Vulnerabilities

B.

Baseline the Environment

C.

Shield and monitor

D.

Define Policy

Question 16

You work as a Security Administrator for uCertify Inc. You have been assigned a task to provide a solution that has a striped set with distributed parity or interleave parity. Which of the following will help you to meet the organizational requirements?

Options:

A.

RAID 3/4

B.

RAID 0

C.

RAID 10

D.

RAID 5

Question 17

In which of the following categories can a computer security policy be categorized?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Availability

B.

Integrity

C.

Reliability

D.

Confidentiality

Question 18

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Resumption of hardware

B.

Resumption of data

C.

Resumption of sales

D.

Resumption of applications

Question 19

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Snow.exe

B.

Stegbreak

C.

Anti-x

D.

Image hide

Question 20

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

Options:

A.

System state data

B.

DNS record

C.

Users manual

D.

Cache memory

Question 21

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to

submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Asset Value

B.

Single Loss Expectancy

C.

Annualized Rate of Occurrence

D.

Number of employees in the company

Question 22

You work as a Network Security Administrator for uCertify Inc. You feel that someone has accessed your computer and used your e-mail account. To check whether there is any virus installed into your computer, you scan your computer but do not find any illegal software. Which of the following types of security attacks generally runs behind the scenes on your computer?

Options:

A.

Zero-day

B.

Rootkit

C.

Hybrid

D.

Replay

Question 23

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

B.

A protocol analyzer can identify physical layer errors in a network switch.

C.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Question 24

Which of the following statements is true about annualized rate of occurrence?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Question 25

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

Options:

A.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

D.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

Question 26

Which of the following are the primary rules defined for RBAC?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Role authorization

B.

Transaction authorization

C.

Role assignment

D.

Transaction assignment

Question 27

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

Options:

A.

Brute Force attack

B.

War dialing attack

C.

Social Engineering attack

D.

Replay attack

Question 28

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

Options:

A.

Risk mitigation

B.

Risk acceptance

C.

Risk avoidance

D.

Risk transference

Question 29

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transference

Question 30

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-10

B.

RAID-1

C.

RAID-5

D.

RAID-0

Question 31

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

Options:

A.

Logic bomb

B.

Sabotage

C.

Smurf

D.

DDoS

Question 32

Which of the following paragraphs of the Turnbull Guidance provide clear description of the principles of a risk treatment plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

16

B.

18

C.

17

D.

19

Question 33

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts. There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

Options:

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a policy to enter their personal email id while logged in to the system.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a new policy that forces users to change their passwords once every 15 days.

Question 34

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$67,250

B.

$92,600

C.

$72,650

D.

$68,250

Question 35

Which of the following are the sub-elements of environmental security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To prevent or respond to environmentally caused conflicts

B.

To protect and assist environment from a material's potential

C.

To prevent or repair military damage to the environment

D.

To protect the environment due to its inherent moral value

Question 36

Which of the following is also known as the 'Code for Information Security'?

Options:

A.

ISO/IEC 20002 standard

B.

ISO/IEC 27001:2005 standard

C.

ISO/IEC 27002:2005 standard

D.

ISO/IEC 20000 standard

Question 37

Which of the following is the correct formula of single loss expectancy?

Options:

A.

SLE= Annualized rate of occurrence*exposure factor

B.

SLE=asset value*exposure factor

C.

SLE= exposure factor*exposure factor

D.

SLE= Annualized loss expectancy*exposure factor

Question 38

Qualitative risk analysis includes judgment, intuition, and experience. Which of the following methods are used to perform qualitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Egress filtering

B.

Checklists

C.

Delphi technique

D.

Brainstorming

Question 39

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

Question 40

Mark works as a Network Security Administrator for uCertify Inc. An employee of the organization comes to Mark and tells him that a few months ago, the employee had filled an online bank form due to some account related work. Today, when again visiting the site, the employee finds that some of his personal information is still being displayed in the webpage. Which of the following types of cookies should be disabled by Mark to resolve the issue?

Options:

A.

Session

B.

Temporary

C.

Secure

D.

Persistent

Question 41

Which of the following administrative policy controls is usually associated with government classifications of materials and the clearances of individuals to access those materials?

Options:

A.

Separation of Duties

B.

Due Care

C.

Acceptable Use

D.

Need to Know

Question 42

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share the organization's personal requirements regarding the tool to the third party. Which of the following documents should be first signed by the third party?

Options:

A.

Non disclosure agreement (NDA)

B.

Acknowledgement papers

C.

Copyright papers

D.

Legal disclaimer

Question 43

Which of the following are the perspectives considered to ensure the confidentiality, integrity, and availability of an organization's assets, information, data, and IT services?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Procedural

B.

Technical

C.

Management

D.

Organizational

Question 44

Which of the following statements is true about Return On Investment?

Options:

A.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

B.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

C.

It is the profit achieved through realization of improvements.

D.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

Question 45

Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?

Options:

A.

Honeypot

B.

Internet bot

C.

Crawler

D.

Spider

Question 46

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A protocol analyzer can identify physical layer errors in a network switch.

B.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

C.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Question 47

Which of the following controls are administrative in nature?

Options:

A.

Directive controls

B.

Recovery controls

C.

Preventive controls

D.

Detective controls

Question 48

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User manuals

B.

Operating systems

C.

Training metarials

D.

Personal data

Question 49

You work as a Network Administrator for uCertify Inc. The organization has constructed a cafeteria for their employees and you are responsible to select the access control method for the cafeteria.

There are a few conditions for giving access to the employees, which are as follows:

1. Top level management can get access any time.

2. Staff members can get access during the specified hours.

3. Guests can get access only in working hours.

Which of the following access control methods is suitable to accomplish the task?

Options:

A.

Discretionary access control

B.

Lattice-based access control

C.

Attribute-based access control

D.

Rule-based access control

Question 50

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk identification

D.

Risk control

Question 51

You are working with a company that depends on real time data being available to employees, thus performance is an issue. They are trying to select the best method for handing the situation of a hard drive crashing. Which of the following would you recommend to them?

Options:

A.

RAID 2

B.

RAID 0

C.

RAID 1

D.

RAID 5

Question 52

Which of the following paragraphs of the Turnbull Report stated that a company's internal control system encompasses the policies, processes, tasks, behaviors, and other aspects of the company?

Options:

A.

Paragraph 28

B.

Paragraph 20

C.

Paragraph 22

D.

Paragraph 21

Question 53

David has identified a technical risk in his project and has been assigned a contingency for that. Which part of the risk response strategy does planning contingency reserves come under?

Options:

A.

Active risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Passive risk acceptance

Question 54

The System Management department has the pass to enter the computer room. The access to that computer room is closed off using the pass reader. Which of the following categories of security defines the above scenario?

Options:

A.

Repressive security measure

B.

Physical security measure

C.

Corrective security measure

D.

Logical security measure

Question 55

Which of the following is the basic requirement to install WinDump on a Windows computer system?

Options:

A.

tcptrace

B.

WinPcap

C.

pcap

D.

EtherPeek

Question 56

Which of the following are elements of an information security policy document?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Policy Text

B.

Policy scope

C.

Scope

D.

Sanctions

Question 57

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the fastest method of backing up data.

B.

It backs up the entire database, including the transaction log.

C.

It is the slowest method for taking a data backup.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Question 58

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Snow

B.

Blindside

C.

ImageHide

D.

Stealth

Question 59

Which of the following is used for improving the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation?

Options:

A.

CBAC

B.

MAC

C.

UAC

D.

Implicit deny

Question 60

Which of the following is a technical measure?

Options:

A.

Encryption of data

B.

Creation of a policy that defines what is and what is not permitted in the e-mail

C.

Allocation of information to an owner

D.

Storage of system management passwords

Question 61

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies

B.

Vulnerability assessments

C.

Data classification

D.

Data encryption

Question 62

You work as a Security Professional for uCertify Inc. You are working on a Disaster Recovery Plan (DRP). Which of the following are basic functions of DRP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It protects an organization from major computer services failure.

B.

It guarantees the reliability of standby systems through testing and simulation.

C.

It resists the same disaster to come in the future.

D.

It minimizes decision-making required by personnel during a disaster.

Question 63

Fill in the blank with the appropriate term.

______is the process of managing user authorizations based on the ITU-T Recommendation X.509.

Options:

Question 64

Mark works as a Network Security Administrator for uCertify Inc. He is responsible for securing and analyzing the network of the organization. Mark is concerned about the current network security, as individuals can access the network with bypass authentication, thus allowing them to get more permissions than allotted. Which of the following is responsible for this type of privilege escalation?

Options:

A.

Rootkit

B.

Backdoor

C.

Boot sector

D.

Master Boot Record

Question 65

Which of the following types of software is used by organizations to arrange for different passwords on different systems to have the same value when they belong to the same person?

Options:

A.

Self-service password reset software

B.

Web single signon software

C.

Password synchronization software

D.

Enterprise Single signon software

Question 66

Which of the following elements of the PDCA (Plan-Do-Check-Act) methodology describes the objectives and processes required to deliver results according to the customer requirements and the organization's policies?

Options:

A.

Act

B.

Do

C.

Check

D.

Plan

Question 67

You work as a Security Administrator for uCertify Inc. You need to define security controls regarding the network of the organization. Which of the following information security standards deals with the management of technical security controls in systems and networks?

Options:

A.

Asset management

B.

Organization of information security

C.

Information security incident management

D.

Communications and operations management

Page: 1 / 45
Total 453 questions