GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test
You work as a Security Administrator for uCertify Inc. You are concerned about the password security. Therefore, you have decided to apply a policy that will be helpful for others to create strong passwords. Which of the following are the important things that should be remembered to create a strong password?
Each correct answer represents a complete solution. Choose all that apply.
For which of the following can risk analysis be used?
Which of the following is used for secure financial transactions over the Internet?
Which of the following are the various types of risk analysis?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Which of the following statements are true about security risks?
Each correct answer represents a complete solution. Choose three.
Which of the following are features of protocol and spectrum analyzers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Acts enacted in the United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
Which of the following is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients?
