Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

G2700 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

G2700 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
  • Last Update: Apr 30, 2024
  • Questions and Answers: 453
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

G2700 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

G2700 Practice Exam Questions with Answers GIAC Certified ISO-2700 Specialist Practice Test Certification

Question # 6

Which of the following are the perspectives considered to ensure the confidentiality, integrity, and availability of an organization's assets, information, data, and IT services?

Each correct answer represents a complete solution. Choose all that apply.

A.

Procedural

B.

Technical

C.

Management

D.

Organizational

Full Access
Question # 7

Which of the following types of social engineering attacks is a term that refers to going through someone's trash to find out useful or confidential information?

A.

Authorization by third party

B.

Dumpster diving

C.

Shoulder surfing

D.

Important user posing

Full Access
Question # 8

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

A.

Carry out a risk analysis.

B.

Formulate information security policy.

C.

Set up monitoring.

D.

Carry out an evaluation.

Full Access
Question # 9

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share the organization's personal requirements regarding the tool to the third party. Which of the following documents should be first signed by the third party?

A.

Non disclosure agreement (NDA)

B.

Acknowledgement papers

C.

Copyright papers

D.

Legal disclaimer

Full Access
Question # 10

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

A.

Classification of owners

B.

Usage of information

C.

Identification of inventory

D.

Classification of information

Full Access
Question # 11

Which of the following statements is true about Return On Investment?

A.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

B.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

C.

It is the profit achieved through realization of improvements.

D.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

Full Access
Question # 12

Which of the following controls are administrative in nature?

A.

Directive controls

B.

Recovery controls

C.

Preventive controls

D.

Detective controls

Full Access
Question # 13

You are working with a company that depends on real time data being available to employees, thus performance is an issue. They are trying to select the best method for handing the situation of a hard drive crashing. Which of the following would you recommend to them?

A.

RAID 2

B.

RAID 0

C.

RAID 1

D.

RAID 5

Full Access
Question # 14

Which of the following is a technical measure?

A.

Encryption of data

B.

Creation of a policy that defines what is and what is not permitted in the e-mail

C.

Allocation of information to an owner

D.

Storage of system management passwords

Full Access
Question # 15

Which of the following are the sub-elements of environmental security?

Each correct answer represents a complete solution. Choose all that apply.

A.

To prevent or respond to environmentally caused conflicts

B.

To protect and assist environment from a material's potential

C.

To prevent or repair military damage to the environment

D.

To protect the environment due to its inherent moral value

Full Access
Question # 16

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

A.

DDoS

B.

Smurf

C.

Logic bomb

D.

Sabotage

Full Access
Question # 17

Which of the following documents is developed along the risk management processes to monitor and control risks?

A.

Fault tree

B.

Risk mitigation

C.

Decision tree

D.

Risk register

Full Access
Question # 18

Which of the following statements MOST closely depicts the difference between qualitative risk analysis and quantitative risk analysis?

A.

A quantitative RA does not use the hard costs of losses and a qualitative RA does.

B.

A quantitative RA cannot use a number of calculations.

C.

A qualitative RA uses a number of complex calculations.

D.

Lesser amount of guesswork is used in a quantitative RA.

Full Access
Question # 19

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cost of lost income from missed sales

B.

Sales aspect of the business

C.

Cost of low productivity

D.

Innovations in electronic funds transfer

Full Access
Question # 20

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Full Access
Question # 21

Which of the following are the various types of security measures?

Each correct answer represents a complete solution. Choose all that apply.

A.

Reductive

B.

Preventive

C.

Quantitative

D.

Qualitative

Full Access
Question # 22

Mark works as a Data Center Manager for TechNet Inc. A few days ago, he published a blog about himself during his working hours. However, as per the organization's policy, any member of the organization cannot use any resources of the organization for his personal use. Since Mark has violated the policy, he should go to an internal committee and be informed of his rights in the matter. Which of the following practices is being implemented?

A.

Due process

B.

Integrity Management Consulting

C.

Due diligence

D.

Due care

Full Access
Question # 23

Which of the following are security design principles required for information protection?

Each correct answer represents a complete solution. Choose all that apply.

A.

Closed design

B.

Least privilege

C.

Separation of duties

D.

Complete meditation

Full Access
Question # 24

Which of the following protects original works of authorship including literary, dramatic, musical, artistic, and other intellectual works?

A.

Criminal law

B.

Civil law

C.

Copyright law

D.

Administrative law

Full Access
Question # 25

John works as a Security Administrator for uCertify Inc. As per his past experience, he wants to make a policy stating that any hardware devices containing information about the organization should be destroyed properly before they are thrown. After applying this policy, John will be able to ensure that the information on the devices will not fall into the hands of unauthorized persons after properly discarding the devices.

Which of the following types of policies is John going to create?

A.

Due Care

B.

Privacy

C.

Disposal and destruction

D.

Security

Full Access
Question # 26

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

A.

Clicking on a deceptive pop-up window

B.

Updating windows files automatically

C.

Visiting a website

D.

Viewing an e-mail message

Full Access
Question # 27

You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of change management?

Each correct answer represents a complete solution. Choose all that apply.

A.

Improved adverse impact of changes on the quality of IT services

B.

Improved IT personnel productivity, since there is a reduced number of urgent changes and a back-out of erroneous changes

C.

Improved productivity of users due to more stable and better IT services

D.

Increased ability to absorb frequent changes without making an unstable IT environment

Full Access
Question # 28

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

A.

Risk transference

B.

Risk acceptance

C.

Risk avoidance

D.

Risk mitigation

Full Access
Question # 29

Risk analysis provides a great deal of useful information. It has four main objectives. Which of the following is not an objective of risk analysis?

A.

To identify assets and their value

B.

To determine a balance between the costs of an incident and a security measure

C.

To determine vulnerabilities and threats

D.

To determine the costs of threats

Full Access
Question # 30

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

A.

Deterrent control

B.

Application control

C.

Preventive control

D.

Detective control

Full Access
Question # 31

Which of the following are the purposes of security awareness, training, and education?

Each correct answer represents a complete solution. Choose all that apply.

A.

Make computer system users aware of their security responsibilities and teaching them correct practices, which helps users change their behavior.

B.

Enhance the skills and knowledge so that the computer users can perform their jobs more securely.

C.

Improve awareness of the need to protect system resources.

D.

Construct in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems.

Full Access
Question # 32

Which of the following are steps of vulnerability management programs?

Each correct answer represents a complete solution. Choose all that apply.

A.

Prioritize Vulnerabilities

B.

Baseline the Environment

C.

Shield and monitor

D.

Define Policy

Full Access
Question # 33

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

A.

Sharpen

B.

Rotate

C.

Blur

D.

Soften

Full Access
Question # 34

Which of the following surveys found that the smaller organizations had had a better understanding of their information assets?

A.

Information Security Breaches Survey (ISBS) 2006

B.

KPMG's Information Security Survey 2000

C.

DTI Survey

D.

CBI Cyber Crime Survey

Full Access
Question # 35

Which of the following statements is true about annualized loss expectancy?

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

D.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

Full Access
Question # 36

You are setting up file permissions on a Windows server. Different users have different access needs. What should be your guiding principal in assigning file permissions?

A.

Make three groups (one with low access, 1 moderate, and 1 high) and fit everyone into one of these groups.

B.

Give users the minimal access required for their job, as this is more secure.

C.

Give everyone access, as this makes administration simpler.

D.

Block access to files until a user specifically requests any.

Full Access
Question # 37

Which of the following are the negative points of CRAMM?

Each correct answer represents a complete solution. Choose all that apply.

A.

Full reviews, which usually last long, generate a lot of hard-copy output.

B.

It regularly updates extensive hierarchical countermeasure databases covering non-technical areas.

C.

After rapid changes to system or network reviewed, there is a possibility of insignificance of some results in a full review due to delay between analysis and implementation.

D.

It requires qualified and experienced practitioners to use it.

Full Access
Question # 38

You work as a Security Administrator for uCertify Inc. You are working on a project related to various security policies. Which of the following information security standards ensures conformance with information security policies, standards, laws, and regulations?

A.

Human resources security

B.

Business continuity management

C.

Compliance

D.

Asset management

Full Access
Question # 39

Which of the following phases of the PDCA model is the monitoring and controlling phase of the Information Security Management System (ISMS)?

A.

Act

B.

Do

C.

Check

D.

Plan

Full Access
Question # 40

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

A.

Personal data

B.

Electricity

C.

Reputation of the company

D.

Equipment

Full Access
Question # 41

Which of the following pillars of Basel II is concerned with maintenance of regulatory capital intended for three major components of risk that a bank faces, which are credit risk, operational risk, and market risk?

A.

Pillar 4

B.

Pillar 2

C.

Pillar 3

D.

Pillar 1

Full Access
Question # 42

Which of the following is the basic requirement to install WinDump on a Windows computer system?

A.

tcptrace

B.

WinPcap

C.

pcap

D.

EtherPeek

Full Access
Question # 43

Which of the following concepts or terms states that changes related to one requirement, i.e., scope, time, or cost, will at least influence one other element?

A.

Triple theory estimation

B.

Triple point theory

C.

Triple point estimation

D.

Triple constraint

Full Access
Question # 44

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to classify different information assets used in your organization. Which of the following should be the basis of your classification?

A.

Usage of the information for the organization

B.

Owner of the information

C.

Origin of the information

D.

Impact on the organization if information is disclosed

Full Access
Question # 45

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A.

Cold site

B.

Hot site

C.

Off site

D.

Warm site

Full Access
Question # 46

You work as a Security Administrator for uCertify Inc. You have made a plan to increase the security of the organization and you want to show this to the CEO of the organization. But, you do not want to share this information with others. Therefore, you want to classify this information.

Which of the following will be the suitable classification to accomplish the task?

A.

Private or confidential

B.

Management only

C.

Department specific

D.

Classified

Full Access
Question # 47

Mark works as a security manager for SoftTech Inc. He is performing a security awareness program. To be successful in performing the awareness program, he should take into account the needs and current levels of training and understanding of the employees and audience. There are five key ways, which Mark should keep in mind while performing this activity:

l Current level of computer usage

l What the audience really wants to learn

l How receptive the audience is to the security program

l How to gain acceptance

l Who might be a possible ally

Which of the following activities is performed in this security awareness process?

A.

Audience segmentation

B.

Audience participation

C.

Separation of duties

D.

Stunned owl syndrome

Full Access
Question # 48

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

A.

Annualized Rate of Occurrence

B.

Number of employees in the company

C.

Single Loss Expectancy

D.

Asset Value

Full Access
Question # 49

Which of the following statements is true about single loss expectancy?

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Full Access
Question # 50

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

A.

Project risk management happens at every milestone.

B.

Project risk management has been concluded with the project planning.

C.

At every status meeting of the project team, project risk management is an agenda item.

D.

Project risk management is scheduled for every month in the 18-month project.

Full Access
Question # 51

Mark works as a Network Security Administrator for uCertify Inc. He is responsible for securing and analyzing the network of the organization. Mark is concerned about the current network security, as individuals can access the network with bypass authentication, thus allowing them to get more permissions than allotted. Which of the following is responsible for this type of privilege escalation?

A.

Rootkit

B.

Backdoor

C.

Boot sector

D.

Master Boot Record

Full Access
Question # 52

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where

significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

A.

Chosen-Stego Attack

B.

Active Attacks

C.

Stegdetect Attack

D.

Steg-Only Attack

Full Access
Question # 53

Which formula will you use to calculate the estimated average cost of 1 hour of downtime?

A.

(Employee costs per hour / Number of employees affected by outage) + (Average income per hour)

B.

(Employee costs per hour - Number of employees affected by outage) + (Average income per hour)

C.

(Employee costs per hour X Number of employees affected by outage) - (Average income per hour)

D.

(Employee costs per hour X Number of employees affected by outage) + (Average income per hour)

Full Access
Question # 54

Fill in the blank with an appropriate phrase.

The______ is concerned with rebuilding production processing and determining the criticality of data.

A.

recovery team

Full Access
Question # 55

Which of the following individuals calculates the recovery time and cost estimates while performing a business impact analysis (BIA)?

A.

Business process owner

B.

Business continuity coordinator

C.

Risk Executive

D.

Information security manager

Full Access
Question # 56

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response?

A.

Risk owner

B.

Project sponsor

C.

Diane

D.

Subject matter expert

Full Access
Question # 57

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the classification of information assets. Which of the following controls of the ISO standard provides guidelines on the classification of information?

A.

Control A.7.1.3

B.

Control A.7.1.2

C.

Control A.7.2

D.

Control A.7.2.1

Full Access
Question # 58

Sam is the CEO of Gentech Inc. The company is located in New York. He has to start a new project in order to increase the overall revenue of the company. Sam has to develop an ISMS policy. In which of the following phases of the PDCA cycle will Sam accomplish the task?

A.

Do

B.

Plan

C.

Act

D.

Check

Full Access
Question # 59

Which of the following are responsibilities of the Service Level Manager?

Each correct answer represents a complete solution. Choose all that apply.

A.

To define Service Level Agreement

B.

To define the Service Level Agreement structure

C.

To define the Underpinning Contracts (UC) with external providers

D.

To define the Operational Level Agreements with internal providers

Full Access
Question # 60

David works as the Network Administrator for uCertify Inc. He has been asked to perform risk analysis. He decides to do it by using CRAMM. The CEO wants to know the negative points of CRAMM which is going to be used by David. Which of the following points will David tell the CEO of the organization?

A.

It maintains consistency that results from similar solutions for similar risk profiles.

B.

It regularly updates extensive hierarchical countermeasure databases covering non-technical areas.

C.

It requires qualified and experienced practitioners to use it.

D.

It helps in developing full reviews and rapid reviews.

Full Access
Question # 61

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

A.

Running applications back online

B.

Recovering data

C.

Fault detection

D.

Sales estimation

Full Access
Question # 62

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

A.

Logic bomb

B.

Sabotage

C.

Smurf

D.

DDoS

Full Access
Question # 63

Fill in the blank with the appropriate term.

______is a prime example of a high-interaction honeypot.

Full Access
Question # 64

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

A.

Equipment

B.

Electricity

C.

Reputation of the company

D.

Personal data

Full Access
Question # 65

Which of the following laws or acts enforces the prohibition against cyber stalking?

A.

Malicious Communications Act (1998)

B.

Anti-Cyber-Stalking law (1999)

C.

Stalking Amendment Act (1999)

D.

Stalking by Electronic Communications Act (2001)

Full Access
Question # 66

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

A.

$67,250

B.

$92,600

C.

$72,650

D.

$68,250

Full Access
Question # 67

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

A.

Risk acceptance

B.

Risk transference

C.

Risk avoidance

D.

Risk mitigation

Full Access