[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 21-30

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 21 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.

Which of the following are the main objectives of change management? Each correct answer represents a complete solution. Choose all that apply.

  1. Minimal disruption of services

  2. Reduction of inventory in accordance with revenue

  3. Economic utilization of resources involved in the change

  4. Reduction in back-out activities

Answer: A,C,D

Question No: 22 – (Topic 1)

Which of the following is used for secure financial transactions over the Internet?

  1. ATM

  2. VPN

  3. SSL

  4. SET

Answer: D

Question No: 23 – (Topic 1)

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee#39;s verification in the organization?

  1. Network Security

  2. Physical security

  3. Access security

  4. Human resource security

Answer: D

Question No: 24 – (Topic 1)

You work as the Human Resource Manager for uCertify Inc. You need to recruit some candidates for the marketing department of the organization. Which of the following should be defined to the new employees of the organization before they have joined?

Each correct answer represents a complete solution. Choose all that apply.

  1. Marketing tips and tricks

  2. Organization#39;s network topology

  3. Job roles

  4. Organization#39;s security policy

Answer: C,D

Question No: 25 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You need to make the

documentation on change management. What are the advantages of change management?

Each correct answer represents a complete solution. Choose all that apply.

  1. Improved productivity of users due to more stable and better IT services

  2. Improved IT personnel productivity, since there is a reduced number of urgent changes and a back-out of erroneous changes

  3. Improved adverse impact of changes on the quality of IT services

  4. Increased ability to absorb frequent changes without making an unstable IT environment

    Answer: A,B,D

    Question No: 26 – (Topic 1)

    You work as a Network Administrator for uCertify Inc. The organization has constructed a cafeteria for their employees and you are responsible to select the access control method for the cafeteria.

    There are a few conditions for giving access to the employees, which are as follows:

    1. Top level management can get access any time.

    2. Staff members can get access during the specified hours.

    3. Guests can get access only in working hours.

      Which of the following access control methods is suitable to accomplish the task?

      1. Discretionary access control

      2. Lattice-based access control

      3. Attribute-based access control

      4. Rule-based access control

Answer: D

Question No: 27 – (Topic 1)

Which of the following are the uses of cryptography as defined in a policy document?

Each correct answer represents a complete solution. Choose all that apply.

  1. Backup

  2. Control of keys

  3. Applications supporting cryptography

  4. Recovery

Answer: A,B,C

Question No: 28 – (Topic 1)

Which of the following is the designing phase of the ISMS?

  1. Check

  2. Plan

  3. Act

  4. Do

Answer: B

Question No: 29 – (Topic 1)

Single Loss Expectancy (SLE) represents an organization#39;s loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

  1. SLE = Asset Value (AV) * Exposure Factor (EF)

  2. SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

  3. SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)

  4. SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

Answer: A

Question No: 30 – (Topic 1)

Qualitative risk analysis includes judgment, intuition, and experience. Which of the following methods are used to perform qualitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

  1. Egress filtering

  2. Checklists

  3. Delphi technique

  4. Brainstorming

Answer: B,C,D

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.