[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 121 – (Topic 2)

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

  1. Personal security

  2. Network Security

  3. Physical security

  4. Human resource security

Answer: D

Question No: 122 – (Topic 2)

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

  1. Utility model

  2. Cookie

  3. Trade secret

  4. Copyright

Answer: C

Question No: 123 – (Topic 2)

Which of the following types of cyberstalking damages the reputation of their victim and turns other people against them by setting up their own Websites, blogs, or user pages for this purpose?

  1. False accusation

  2. False victimization

  3. Encouraging others to harass the victim

  4. Attempts to gather information about the victim

Answer: A

Question No: 124 – (Topic 2)

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

  1. It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.

  2. It enables mass surveillance of communications in transit.

  3. It enables certain private bodies to demand that someone hand over keys to protected information.

  4. It allows certain public bodies to monitor people#39;s Internet activities.

Answer: A,B,D

Question No: 125 – (Topic 2)

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company.

Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Linguistic steganography

  2. Technical steganography

  3. Perceptual masking

  4. Text Semagrams

Answer: A,D

Question No: 126 – (Topic 2)

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

  1. RAID 1

  2. RAID 6

  3. RAID 5

  4. RAID 0

Answer: A

Question No: 127 – (Topic 2)

Which of the following policies defines the acceptable methods of remotely connecting a system to the internal network?

  1. Remote access policy

  2. Computer security policy

  3. Network security policy

  4. User Account Policy

Answer: A

Question No: 128 – (Topic 2)

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

  1. Configuration Management

  2. Business Continuity Planning

  3. Social engineering

  4. Change Management

Answer: B

Question No: 129 – (Topic 2)

In which of the following social engineering attacks does an attacker first damage any part of the target#39;s equipment and then advertise himself as an authorized person who can help fix the problem.

  1. Impersonation attack

  2. Reverse social engineering attack

  3. Important user posing attack

  4. In person attack

Answer: B

Question No: 130 – (Topic 2)

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

  1. Snow.exe

  2. Stegbreak

  3. Anti-x

  4. Image hide

Answer: A,D

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.