[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 31 – (Topic 1)

Which of the following information security standards deals with the protection of the computer facilities?

  1. Physical and environmental security

  2. Compliance

  3. Organization of information security

  4. Risk assessment and treatment

Answer: A

Question No: 32 – (Topic 1)

Which of the following is a technical measure?

  1. Encryption of data

  2. Creation of a policy that defines what is and what is not permitted in the e-mail

  3. Allocation of information to an owner

  4. Storage of system management passwords

Answer: A

Question No: 33 – (Topic 1)

Which of the following types of social engineering attacks is a term that refers to going through someone#39;s trash to find out useful or confidential information?

  1. Authorization by third party

  2. Dumpster diving

  3. Shoulder surfing

  4. Important user posing

Answer: B

Question No: 34 – (Topic 1)

Which of the following are the things included by sensitive system isolation? Each correct answer represents a complete solution. Choose all that apply.

  1. Construction of appropriately isolated environments where technically and operationally feasible

  2. Inclusion of all documents technically stored in a virtual directory

  3. Explicit identification and acceptance of risks when shared facilities and/or resources must be used

  4. Explicit identification and documentation of sensitivity by each system/application controller (owner)

Answer: A,C,D

Question No: 35 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to assign ownership of some assets of the organization. Which of the following statements correctly describe the responsibilities of an asset owner?

Each correct answer represents a complete solution. Choose all that apply.

  1. The owner has property rights to the asset.

  2. The owner is allowed to delegate responsibility for maintaining the asset.

  3. The owner should have a document describing the security controls for the asset.

  4. The owner is allowed to delegate accountability of the asset.

Answer: B,C

Question No: 36 – (Topic 1)

You work as a Security Administrator for uCertify Inc. You need to make a documentation to provide ongoing education and awareness training of disciplinary actions of your company. What are the primary reasons to create this documentation?

Each correct answer represents a complete solution. Choose all that apply.

  1. To ensure that employees understand information security threats

  2. To ensure that employees have the necessary knowledge to mitigate security threats

  3. To ensure that employees are aware of and understand their roles and responsibilities

  4. To ensure that employees have the necessary knowledge about the company#39;s forthcoming Projects

Answer: A,B,C

Question No: 37 – (Topic 1)

The stronger points of CRAMM assist prioritization by providing a countermeasure with high priority if some conditions are met. Which of the following are these conditions?

Each correct answer represents a complete solution. Choose all that apply.

  1. It requires protecting a high risk system.

  2. It does not require the installation of alternative countermeasures.

  3. It is inexpensive to implement.

  4. It provides protection against several threats.

Answer: A,B,D

Question No: 38 – (Topic 1)

Which of the following tasks are performed by Information Security Management? Each correct answer represents a complete solution. Choose all that apply.

  1. It is designed to protect information and any equipment that is used in connection with its storage, transmission, and processing.

  2. It is designed to develop information and any equipment that is used in connection with its storage, transmission, and processing.

  3. It is designed to recognize information and any equipment that is used in connection with its storage, transmission, and processing.

  4. It is designed to control information and any equipment that is used in connection with its storage, transmission, and processing.

Answer: A,C,D

Question No: 39 – (Topic 1)

Which of the following standards was made in 1995 by the joint initiative of the Department of Trade and Industry in the United Kingdom and leading UK private-sector businesses?

  1. BS7799

  2. ISO 27001

  3. BS2700

  4. ISMS

Answer: A

Question No: 40 – (Topic 1)

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

  1. It depends on the cultural aspects.

  2. It depends on the infrastructure aspects of the organization.

  3. It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

  4. It depends on the physical aspects of the organization.

Answer: A,C,D

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.