[Free] 2017(Sep) EnsurePass Testinsides GIAC G2700 Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released G2700
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 91 – (Topic 1)

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

  1. DDoS

  2. Smurf

  3. Logic bomb

  4. Sabotage

Answer: C

Question No: 92 – (Topic 1)

Which of the following are features of protocol and spectrum analyzers? Each correct answer represents a complete solution. Choose all that apply.

  1. A protocol analyzer can identify physical layer errors in a network switch.

  2. A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

  3. A protocol analyzer can be used to analyze network traffic to trace specific transactions.

  4. A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Answer: B,C,D

Question No: 93 – (Topic 1)

Which of the following states that a user should never be given more privileges than are required to carry out a task?

  1. Principle of least privilege

  2. Role-based security

  3. Security through obscurity

  4. Segregation of duties

Answer: A

Question No: 94 – (Topic 1)

Which of the following are the various types of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

  1. Corrective

  2. Quantitative

  3. Repressive

  4. Qualitative

Answer: B,D

Question No: 95 – (Topic 1)

Which of the following statements describes the purpose of information security policy?

  1. The security policy makes the security plan flawless by providing the necessary details.

  2. The security policy provides direction and support to the management regarding information security.

  3. Analysis of risks and search for countermeasures are known as Policy Documents.

  4. The security policy provides details about threats and the consequences.

Answer: B

Question No: 96 – (Topic 1)

Which of the following is the correct formula of single loss expectancy?

  1. SLE= Annualized rate of occurrence*exposure factor

  2. SLE=asset value*exposure factor

  3. SLE= exposure factor*exposure factor

  4. SLE= Annualized loss expectancy*exposure factor

Answer: B

Question No: 97 – (Topic 1)

Which of the following statements are true about Information Security Management? Each correct answer represents a complete solution. Choose all that apply.

  1. It is not designed to recognize, control, or protect information or any equipment that is used in connection with its processing.

  2. It is designed to recognize, control, and protect information and any equipment that is used in connection with its storage and transmission.

  3. Information Security is a system of policies and procedures.

  4. Information Security Management has the objective to manage information security effectively within all service providers.

Answer: B,C,D

Question No: 98 – (Topic 1)

Which of the following is the process of removing sensitive information from a document or any other medium, so that it may be distributed to a broader audience?

  1. Sanitization

  2. Censorship

  3. Pixelization

  4. Data remanence

Answer: A

Question No: 99 – (Topic 1)

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the usage of information assets. Which of the following controls of the ISO standard deals with the documentation and implementation of rules for the acceptable use of information assets?

  1. Control A.7.2.1

  2. Control A.7.1.2

  3. Control A.7.1.3

  4. Control A.7.2

Answer: D

Question No: 100 – (Topic 1)

Which of the following is a formal state transition model of computer security policy that is used to describe a set of access control rules which use security labels on objects and clearances for subjects?

  1. Five Pillars model

  2. Classic information security model

  3. Bell-LaPadula model

  4. Clark-Wilson integrity model

Answer: C

Topic 2, Volume B

100% Ensurepass Free Download!
Download Free Demo:G2700 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass G2700 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.