[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 281-290

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 281 – (Topic 3)

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to create a document following the Business Model of information security to provide guidelines for information assets. Which of the following are the elements of the Business Model for information security?

Each correct answer represents a complete solution. Choose all that apply.

  1. Process

  2. Technology

  3. People

  4. Training

  5. Organization Design and Strategy

Answer: A,B,C,E

Question No: 282 – (Topic 3)

You have just taken control over network administration services for a sales and marketing firm. The sales staff (consisting of 10 people) rely heavily on both phone and internet connections for business. You notice that the sales staff has a single T1 line handling their phone and internet connections. Which of the following would be the best suggestion for improving this situation?

  1. Move to fiber optic.

  2. Move them to a T3 line.

  3. Nothing, the system is fine as is.

  4. Add an additional T1 line for redundancy.

Answer: D

Question No: 283 – (Topic 3)

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

  1. Mandatory Access Control

  2. Task-based Access Control

  3. Discretionary Access Control

  4. Role-Based Access Control

Answer: C

Question No: 284 – (Topic 3)

In which of the following categories can a computer security policy be categorized? Each correct answer represents a complete solution. Choose all that apply.

  1. Availability

  2. Integrity

  3. Reliability

  4. Confidentiality

Answer: A,B,C

Question No: 285 – (Topic 3)

You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?

Each correct answer represents a complete solution. Choose all that apply.

  1. Centralized reporting for compliance adherence

  2. Reducing IT costs due to lower number of IT help desk calls about passwords

  3. Reduces phishing success, because users are not trained to enter password everywhere without thinking

  4. Reduces the user experience

Answer: A,B,C

Question No: 286 – (Topic 3)

Which of the following are the various types of security measures?

Each correct answer represents a complete solution. Choose all that apply.

  1. Reductive

  2. Preventive

  3. Quantitative

  4. Qualitative

Answer: A,B

Question No: 287 – (Topic 3)

You work as a CRO for uCertify Inc. You and your team are involved in the pre-assessment phase of the risk governance framework. One of your newly joined team member wants to know the steps involved in the pre-assessment phase. Choose and reorder the steps performed in the pre-assessment phase.

Ensurepass 2017 PDF and VCE

A.

Answer: A

Question No: 288 – (Topic 3)

Which of the following sections come under the ISO/IEC 27002 standard? Each correct answer represents a complete solution. Choose all that apply.

  1. Asset management

  2. Security policy

  3. Financial assessment

  4. Risk assessment

Answer: A,B,D

Question No: 289 – (Topic 3)

Which of the following refers to the process of adjusting the capacity of a company to meet the changed or predicted demands?

  1. Business continuity planning

  2. Capacity planning

  3. DR planning

  4. ER planning

Answer: B

Question No: 290 – (Topic 3)

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

  1. Install the IAS server on the system to verify Internet related activities.

  2. Install the operating system without patches installed and use typical defaults and options.

  3. Install the application that is designed to record the activities of the invader.

  4. Install the RADIUS server to check the authentication of the invader.

Answer: B,C

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.