Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 11 / 14
Total 453 questions

You work as a Security Administrator for uCertify Inc. You are concerned about the password security. Therefore, you have decided to apply a policy that will be helpful for others to create strong passwords. Which of the following are the important things that should be remembered to create a strong password?

Each correct answer represents a complete solution. Choose all that apply.

A.

It should contain at least one number or punctuation character.

B.

It should contain at least one capital letter.

C.

It should be a known word.

D.

It should be of eight characters.

For which of the following can risk analysis be used?

A.

Reducing risks to an acceptable level in conjunction with security measures

B.

Expressing the value of information for an organization in terms of money

C.

Ensuring that security measures are deployed in a cost-effective fashion

D.

Clarifying management about their responsibilities

Which of the following is used for secure financial transactions over the Internet?

A.

ATM

B.

VPN

C.

SSL

D.

SET

Which of the following are the various types of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

A.

Corrective

B.

Quantitative

C.

Repressive

D.

Qualitative

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

A.

Data owner

B.

Data custodian

C.

Auditor

D.

User

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk identification

D.

Risk control

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

A.

These are considered as an indicator of threats coupled with vulnerability.

B.

These can be removed completely by taking proper actions.

C.

These can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

These can be analyzed and measured by the risk analysis process.

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

A.

A protocol analyzer can identify physical layer errors in a network switch.

B.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

C.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Which of the following Acts enacted in the United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

A.

Wiretap Act

B.

Electronic Communications Privacy Act of 1986

C.

Economic Espionage Act of 1996

D.

Computer Fraud and Abuse Act

Which of the following is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients?

A.

BGP

B.

SMTP

C.

CHAP

D.

DHCP