[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 191-200

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 191 – (Topic 2)

What is the name given to the system that guarantees the coherence of information security in the organization?

  1. Information Security Management System

  2. Rootkit

  3. Stemkit

  4. Security regulations for special information for the government

Answer: A

Question No: 192 – (Topic 2)

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

  1. Resumption of hardware

  2. Resumption of data

  3. Resumption of sales

  4. Resumption of applications

Answer: A,B,C

Question No: 193 – (Topic 2)

Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?

  1. Recovery Consistency Objective

  2. Recovery Time Actual

  3. Recovery Time Objective

  4. Recovery Point Objective

Answer: C

Question No: 194 – (Topic 2)

As an attacker, you are sending very small sized packets with durations of 15 minutes per packet to the IIS Web server. Since an IIS session remains alive for a long time, the IDS may be tricked into accepting them as regular packet transformations. Which of the following types of attacking methods are you using?

  1. Session splicing

  2. Nonblind spoofing

  3. Session hijacking

  4. Security Logging

Answer: A

Question No: 195 – (Topic 2)

Mark works as a Security Administrator for uCertify Inc. Somehow Mark comes to know that an employee is keeping illegal software on his workstation. After investigating, Mark finds that this is indeed true. Therefore, Mark decides to file a law suit against the organization, as it is against organization#39;s norms to store illegal information. Now, the organization decides to call the police and suspend Mark from work till further internal inquiries. Which of the following practices has been implemented in this scenario?

  1. Due diligence

  2. Due process

  3. Privacy

  4. Due care

Answer: B

Question No: 196 – (Topic 2)

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Operations and resources are managed.

  2. Training and awareness programs for affected staff are scheduled.

  3. The risk treatment plan is implemented and controls are planned.

  4. The options are identified and evaluated for the treatment of the risks.

Answer: A,B,C

Question No: 197 – (Topic 2)

You work as a Security Administrator for uCertify Inc. You have developed a user manual for internal use, which will help your colleagues to work efficiently in the organization.

However, you are concerned about the possibility of the user manual being distributed to the public. Therefore, you have decided to implement a system of classification so that you can secure information. Which of the following information classification levels will you use to implement the system?

  1. Classified

  2. Public or unclassified

  3. Department specific

  4. Private or confidential

Answer: A

Question No: 198 – (Topic 2)

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

  1. System state data

  2. DNS record

  3. Users manual

  4. Cache memory

Answer: A

Question No: 199 – (Topic 2)

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark#39;s financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

  1. Privacy law

  2. Copyright law

  3. Security law

  4. Trademark law

Answer: A

Question No: 200 – (Topic 2)

Which of the following statements is true about pattern matching IDS?

  1. IDS can match empty list only.

  2. IDS can only be effective unless the company#39;s security policies are not defined and followed in practice.

  3. IDS can trigger only on signatures that are stored in the database of the IDS.

  4. IDS can detect only when an attacker is passively sniffing data.

Answer: C

Topic 3, Volume C

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.