[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 1 – (Topic 1)

Mark works as a Network Security Administrator for uCertify Inc. An employee of the organization comes to Mark and tells him that a few months ago, the employee had filled an online bank form due to some account related work. Today, when again visiting the site, the employee finds that some of his personal information is still being displayed in the webpage. Which of the following types of cookies should be disabled by Mark to resolve the issue?

  1. Session

  2. Temporary

  3. Secure

  4. Persistent

Answer: D

Question No: 2 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of control A.10.1.1. What is the purpose of control A.10.1.1?

  1. It is concerned with the documentation of the human resource security to make recruitments clear to the organization.

  2. It is concerned with the documentation of the supply chain management.

  3. It is concerned with the documentation of operating procedures to ensure the correct and secure use of information processing facilities.

  4. It is concerned with the documentation of the disaster recovery management to ensure proper backup technologies.

Answer: C

Question No: 3 – (Topic 1)

Mark works as a Network Security Administrator for uCertify Inc. He has been assigned the task of installing a MySQL server. Mark wants to monitor only the data that is directed to or originating from the server and he also wants to monitor running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the

following intrusion detection techniques will Mark use to accomplish the task?

  1. Network-based IDS

  2. Signature-based IDS

  3. Anomaly-based IDS

  4. Host-based IDS

Answer: D

Question No: 4 – (Topic 1)

Which of the following are the exceptions of the Data Protection Act?

Each correct answer represents a complete solution. Choose all that apply.

  1. Section 36 – Domestic purposes

  2. Section 28 – National security

  3. Section 55 – Unlawful obtaining of personal data

  4. Section 29 – Crime and taxation

Answer: A,B,D

Question No: 5 – (Topic 1)

Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.

  1. These are considered as an indicator of threats coupled with vulnerability.

  2. These can be removed completely by taking proper actions.

  3. These can be mitigated by reviewing and taking responsible actions based on possible risks.

  4. These can be analyzed and measured by the risk analysis process.

Answer: A,C,D

Question No: 6 – (Topic 1)

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

  1. Risk identification

  2. Security Threat

  3. Project schedule

  4. Team members list

  5. Risk analysis

Answer: A,C,D,E

Question No: 7 – (Topic 1)

Which of the following are the basics of Business Continuity Management? Each correct answer represents a complete solution. Choose all that apply.

  1. Implementation of a risk assessment technique to identify the causes and consequences of failures

  2. Regular checking of business continuity plans

  3. Identification of authentication techniques according to the requirements

  4. Identification of human resources according to the requirements

Answer: A,B,D

Question No: 8 – (Topic 1)

Which of the following controls are administrative in nature?

  1. Directive controls

  2. Recovery controls

  3. Preventive controls

  4. Detective controls

Answer: A

Question No: 9 CORRECT TEXT – (Topic 1)

Fill in the blank with an appropriate phrase.

accord describes the minimum regulatory capital to be allocated by each bank based on its risk profile of assets.

Answer: Basel ll

Question No: 10 – (Topic 1)

You work as an Information Security Officer for uCertify Inc. You need to create an asset management plan differentiating fixed assets from inventory items. How will you differentiate assets from inventory items?

  1. Inventory items are sold.

  2. Assets are temporary usually.

  3. Inventory items are permanent.

  4. Assets cannot be used.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.