[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 251-260

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 251 – (Topic 3)

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after computer crime investigations in the United States?

  1. National Institute of Standards and Technology

  2. Federal Bureau of Investigation

  3. Local or National office of the US secret service

  4. Incident response team

Answer: C

Question No: 252 – (Topic 3)

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

  1. An organization should implement and maintain IDS to manage risks to the network.

  2. An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

  3. An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

  4. An organization should apply encryption to its information assets.

Answer: B

Question No: 253 – (Topic 3)

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of ISMS. Which of the following steps are concerned with the development of ISMS?

Each correct answer represents a complete solution. Choose all that apply.

  1. Risk management

  2. Selection of appropriate controls

  3. HR security planning

  4. Statement of Applicability

Answer: A,B,D

Question No: 254 CORRECT TEXT – (Topic 3)

Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?

Answer: New risks may have been identified. These cannot influence the input data used for Monte Carlo simulation in a way which was not predictable at the time when the

simulation was run.

Answer: New risks may have been identified. These influence the input data used for Monte Carlo simulation in a way which was not predictable at the time when the simulation was run.

Answer: None of the dummy activities in the network logic has an element of uncertainty, which may get bigger over time.

Answer: Some dummy activities in the network logic have an element of uncertainty, which gets bigger over time. While the project proceeds, it is getting even harder to predict how the team members assigned to them will perform.

Answer: D

Question No: 255 – (Topic 3)

Single Loss Expectancy (SLE) represents an organization#39;s loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

  1. SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

  2. SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

  3. SLE = Asset Value (AV) * Exposure Factor (EF)

  4. SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence

Answer: C

Question No: 256 – (Topic 3)

You work as a Security Administrator for uCertify Inc. You have been assigned the task to apply a data availability solution based on a striped disk array without redundancy. Which of the following will you use to accomplish the task?

  1. RAID 3/4

  2. RAID 1

  3. RAID 5

  4. RAID 0

Answer: D

Question No: 257 – (Topic 3)

John works as a Security Administrator for uCertify Inc. As per his past experience, he wants to make a policy stating that any hardware devices containing information about the organization should be destroyed properly before they are thrown. After applying this policy, John will be able to ensure that the information on the devices will not fall into the hands of unauthorized persons after properly discarding the devices.

Which of the following types of policies is John going to create?

  1. Due Care

  2. Privacy

  3. Disposal and destruction

  4. Security

Answer: C

Question No: 258 – (Topic 3)

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

  1. Business Continuity Planning

  2. Change Management

  3. Social engineering

  4. Configuration Management

Answer: A

Question No: 259 – (Topic 3)

You work as a Security Administrator for uCertify Inc. You have developed a user manual for internal use, which will help your colleagues to work efficiently in the organization.

However, you are concerned about the possibility of the user manual being distributed to the public. Therefore, you have decided to implement a system of classification so that you can secure information.

Which of the following information classification levels will you use to implement the system?

  1. Department specific

  2. Public or unclassified

  3. Private or confidential

  4. Classified

Answer: D

Question No: 260 – (Topic 3)

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

  1. Carry out an evaluation.

  2. Formulate information security policy.

  3. Carry out a risk analysis.

  4. Set up monitoring.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.