[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 51 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations management. Which of the following controls of the ISO standard is concerned with operational procedures and responsibilities?

  1. Control A.10.1

  2. Control A.7.1

  3. Control A.8.1

  4. Control A.9.2

Answer: A

Question No: 52 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share the organization#39;s personal requirements

regarding the tool to the third party. Which of the following documents should be first signed by the third party?

  1. Non disclosure agreement (NDA)

  2. Acknowledgement papers

  3. Copyright papers

  4. Legal disclaimer

Answer: A

Question No: 53 – (Topic 1)

Which of the following is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients?

  1. BGP

  2. SMTP

  3. CHAP

  4. DHCP

Answer: C

Question No: 54 – (Topic 1)

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

  1. Data owner

  2. Data custodian

  3. Auditor

  4. User

Answer: C

Question No: 55 – (Topic 1)

Mark works as a Security Administrator for uCertify Inc. For the last few days, he is getting

an error message, i.e., #39;Remove the Boot.ini file because it is harmful for operating system#39;. When Mark reads about the Boot.ini file, he finds that it is a system file that is used to load the operating system on a computer. Which of the following types of virus has attacked Mark#39;s computer?

  1. Polymorphic

  2. Hoax

  3. Macro

  4. Multipartite

Answer: B

Question No: 56 – (Topic 1)

Which of the following Acts enacted in the United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

  1. Wiretap Act

  2. Electronic Communications Privacy Act of 1986

  3. Economic Espionage Act of 1996

  4. Computer Fraud and Abuse Act

Answer: B

Question No: 57 – (Topic 1)

Which of the following operations are performed by the Identity Management Process? Each correct answer represents a complete solution. Choose all that apply.

  1. Providing Single Sign-On access

  2. Making possible automated application provision

  3. Provisioning and coordinating user identities

  4. Ensuring secure deployment of applications

Answer: A,B,C,D

Question No: 58 – (Topic 1)

Cigital Risk Management Method was developed by Gary McGraw of Cigital and John Viega of Stonewall Software, and it defines software security risk management process. Choose and re-order the risk management steps that are included in this method.

Ensurepass 2017 PDF and VCE


Answer: A

Question No: 59 – (Topic 1)

Which of the following are the two methods that are commonly used for applying mandatory access control?

Each correct answer represents a complete solution. Choose all that apply.

  1. Lattice-based access control

  2. Attribute-based access control

  3. Rule-based access control

  4. Discretionary access control

Answer: A,C

Question No: 60 – (Topic 1)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP- based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

  1. RAID-1

  2. RAID-5

  3. RAID-4

  4. RAID-3

  5. RAID-0

Answer: E

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.