[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 111 – (Topic 2)

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts. There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

  1. Create a policy that forces users to create a password combined with special characters.

  2. Create a policy to enter their personal email id while logged in to the system.

  3. Create a policy to enter their employee code while logged in to the system.

  4. Create a new policy that forces users to change their passwords once every 15 days.

Answer: D

Question No: 112 – (Topic 2)

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

  1. Resumption of applications

  2. Resumption of hardware

  3. Resumption of data

  4. Resumption of sales

Answer: A,B,C

Question No: 113 – (Topic 2)

Sam works as the Chief Information Security Officer for Blue Well Inc. There are a number of teams for the security purposes. Which of the following are the types of teams of which Sam can be a part of?

Each correct answer represents a complete solution. Choose all that apply.

  1. Computer Emergency Response Team

  2. Computer Data Development Team

  3. Computer Security Incident Response Team

  4. Computer Information Development Team

Answer: A,C

Question No: 114 – (Topic 2)

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

  1. Install the IAS server on the system to verify Internet related activities.

  2. Install the RADIUS server to check the authentication of the invader.

  3. Install the application that is designed to record the activities of the invader.

  4. Install the operating system without patches installed and use typical defaults and options.

Answer: C,D

Question No: 115 – (Topic 2)

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he

was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

  1. Logic bomb

  2. Sabotage

  3. Smurf

  4. DDoS

Answer: A

Question No: 116 – (Topic 2)

Which of the following tools can be used to detect steganography?

  1. Blindside

  2. Snow

  3. Dskprobe

    Answer: C

    Question No: 117 – (Topic 2)

    Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography.

    Victor performs the following techniques to accomplish the task:

    1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

    2. Reducing noise by adjusting color and averaging pixel value.

    3. Sharpening, Rotating, Resampling, and Softening the image. Which of the following Steganography attacks is Victor using?

      1. Chosen-Stego Attack

      2. Active Attacks

      3. Stegdetect Attack

      4. Steg-Only Attack

Answer: B

Question No: 118 – (Topic 2)

Which of the following paragraphs of the Turnbull Report stated that a company#39;s internal control system encompasses the policies, processes, tasks, behaviors, and other aspects of the company?

  1. Paragraph 20

  2. Paragraph 21

  3. Paragraph 28

  4. Paragraph 22

Answer: A

Question No: 119 – (Topic 2)

Which of the following activities are performed by the #39;Do#39; cycle component of PDCA (plan- docheck- act)?

Each correct answer represents a complete solution. Choose all that apply.

  1. It manages resources that are required to achieve a goal.

  2. It determines controls and their objectives.

  3. It performs security awareness training.

  4. It detects and responds to incidents properly.

  5. It operates the selected controls.

Answer: A,C,D,E

Question No: 120 – (Topic 2)

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often

the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

  1. At every status meeting of the project team, project risk management is an agenda item.

  2. Project risk management is scheduled for every month in the 18-month project.

  3. Project risk management happens at every milestone.

  4. Project risk management has been concluded with the project planning.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.