Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 13 / 14
Total 453 questions

Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?

A.

ICMP

B.

SNMP

C.

UDP

D.

SMTP

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

A.

Carry out a risk analysis.

B.

Formulate information security policy.

C.

Set up monitoring.

D.

Carry out an evaluation.

Mark works as an Office Assistant for uCertify Inc. He is responsible for managing office documents. Today, after opening a word document, Mark noticed that the other opened documents are closed suddenly. After reopening those documents, Mark found some modifications in the documents. He contacted his Security Administrator and came to know that there is a virus program installed in the operating system. Which of the following types of virus has attacked the operating system?

A.

Data file

B.

Macro

C.

Polymorphic

D.

Boot sector

Which of the following are the sub-elements of environmental security?

Each correct answer represents a complete solution. Choose all that apply.

A.

To prevent or respond to environmentally caused conflicts

B.

To protect and assist environment from a material's potential

C.

To prevent or repair military damage to the environment

D.

To protect the environment due to its inherent moral value

Sam is the CEO of Gentech Inc. The company is located in New York. He has to start a new project in order to increase the overall revenue of the company. Sam has to develop an ISMS policy. In which of the following phases of the PDCA cycle will Sam accomplish the task?

A.

Plan

B.

Do

C.

Check

D.

Act

Which of the following are the exceptions of the Data Protection Act?

Each correct answer represents a complete solution. Choose all that apply.

A.

Section 36 - Domestic purposes

B.

Section 28 - National security

C.

Section 55 - Unlawful obtaining of personal data

D.

Section 29 - Crime and taxation

In which of the following does CRAMM provide assistance?

Each correct answer represents a complete solution. Choose all that apply.

A.

Audits

B.

Contingency planning

C.

US7799 certification

D.

BS7799 certification

Which of the following is the process of removing sensitive information from a document or any other medium, so that it may be distributed to a broader audience?

A.

Sanitization

B.

Censorship

C.

Pixelization

D.

Data remanence

You work as a Security Administrator for uCertify Inc. You have been assigned a task to implement information classification levels. You want to put the highly sensitive documents that should only be accessed by few people of the organization. In which of the following information classification levels should you put those documents?

A.

Department specific

B.

High security levels

C.

Not to be copied

D.

Classified

Which of the following controls help in the reduction of the effect of an attack?

A.

Preventive controls

B.

Directive controls

C.

Corrective controls

D.

Detective controls