[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 131 – (Topic 2)

You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best

way to avoid this problem?

  1. Implement least privileges.

  2. Implement RBAC.

  3. Implement three way authentication.

  4. Implement separation of duties.

Answer: D

Question No: 132 – (Topic 2)

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

  1. System state data

  2. Users manual

  3. DNS record

  4. Cache memory

Answer: A

Question No: 133 – (Topic 2)

Which of the following laws or acts enforces the prohibition against cyber stalking?

  1. Malicious Communications Act (1998)

  2. Anti-Cyber-Stalking law (1999)

  3. Stalking Amendment Act (1999)

  4. Stalking by Electronic Communications Act (2001)

Answer: C

Question No: 134 – (Topic 2)

Which of the following are the various domains in the ISO/IEC 27002?

Each correct answer represents a complete solution. Choose all that apply.

  1. Management policy

  2. Security policy

  3. Access security

  4. Compliance

Answer: B,C,D

Question No: 135 – (Topic 2)

Which of the following needs to be documented to preserve evidences for presentation in court?

  1. Account lockout policy

  2. Chain of custody

  3. Incident response policy

  4. Separation of duties

Answer: B

Question No: 136 – (Topic 2)

You work as a Security Administrator for uCertify Inc. You are concerned about the password security. Therefore, you have decided to apply a policy that will be helpful for others to create strong passwords. Which of the following are the important things that should be remembered to create a strong password?

Each correct answer represents a complete solution. Choose all that apply.

  1. It should be of eight characters.

  2. It should be a known word.

  3. It should contain at least one number or punctuation character.

  4. It should contain at least one capital letter.

Answer: A,C,D

Question No: 137 – (Topic 2)

Which of the following are features of protocol and spectrum analyzers? Each correct answer represents a complete solution. Choose all that apply.

  1. A protocol analyzer can be used to analyze network traffic to trace specific transactions.

  2. A protocol analyzer can identify physical layer errors in a network switch.

  3. A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

  4. A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Answer: A,C,D

Question No: 138 – (Topic 2)

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn#39;t know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

  1. Brute Force attack

  2. War dialing attack

  3. Social Engineering attack

  4. Replay attack

Answer: C

Question No: 139 – (Topic 2)

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

  1. Equipment

  2. Electricity

  3. Reputation of the company

  4. Personal data

Answer: C

Question No: 140 – (Topic 2)

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

  1. RAID-10

  2. RAID-1

  3. RAID-5

  4. RAID-0

Answer: B

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.