[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/G2700.html

Topic 1, Volume A

Question No: 41 – (Topic 1)

Which of the following is one of the mechanisms available for administrators to employ for replicating the databases containing the DNS data across a set of DNS servers?

  1. DNS zone transfer

  2. DNS cache poisoning

  3. DNS spoofing

  4. ARP spoofing

Answer: A

Question No: 42 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?

Each correct answer represents a complete solution. Choose all that apply.

  1. User manuals

  2. Operating systems

  3. Training metarials

  4. Personal data

Answer: A,C,D

Question No: 43 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term.

is the built-in file encryption tool for Windows file systems. It protects encrypted files from those who have physical possession of the computer where the encrypted files are stored.

Answer: EFS

Question No: 44 – (Topic 1)

Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.

  1. Assuring the integrity of organizational data

  2. Building Risk free systems

  3. Risk identification

  4. Risk control

Answer: C,D

Question No: 45 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

  1. Classification of owners

  2. Usage of information

  3. Identification of inventory

  4. Classification of information

Answer: D

Question No: 46 – (Topic 1)

Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?

Each correct answer represents a complete solution. Choose all that apply.

  1. Deviate

  2. Plan

  3. Calculate

  4. Act

Answer: B,D

Question No: 47 – (Topic 1)

Which of the following international information security standards is concerned with

anticipating and responding to information security breaches?

  1. Organization of information security

  2. Information security incident management

  3. Physical and environmental security

  4. Risk assessment and treatment

Answer: B

Question No: 48 – (Topic 1)

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts.

There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

  1. Create a policy that forces users to create a password combined with special characters.

  2. Create a new policy that forces users to change their passwords once every 15 days.

  3. Create a policy to enter their employee code while logged in to the system.

  4. Create a policy to enter their personal email id while logged in to the system.

Answer: B

Question No: 49 – (Topic 1)

You work as a Project Manager for uCertify Inc. You are working on an asset management plan.

You need to make the documentation on every single process related to asset management.

Which of the following is an example of asset management?

  1. Making DR plan

  2. Tracking references

  3. Checking topology

  4. Tracking inventory

Answer: D

Question No: 50 – (Topic 1)

In which of the following does CRAMM provide assistance?

Each correct answer represents a complete solution. Choose all that apply.

  1. Audits

  2. Contingency planning

  3. US7799 certification

  4. BS7799 certification

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.