Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 14 / 14
Total 453 questions

Fill in the blank with an appropriate phrase.

_________accord describes the minimum regulatory capital to be allocated by each bank based on its risk profile of assets.

Which of the following are the things included by sensitive system isolation?

Each correct answer represents a complete solution. Choose all that apply.

A.

Construction of appropriately isolated environments where technically and operationally feasible

B.

Inclusion of all documents technically stored in a virtual directory

C.

Explicit identification and acceptance of risks when shared facilities and/or resources must be used

D.

Explicit identification and documentation of sensitivity by each system/application controller (owner)

You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.

Which of the following are the main objectives of change management?

Each correct answer represents a complete solution. Choose all that apply.

A.

Minimal disruption of services

B.

Reduction of inventory in accordance with revenue

C.

Economic utilization of resources involved in the change

D.

Reduction in back-out activities

You work as a Network Administrator for uCertify Inc. The organization has constructed a cafeteria for their employees and you are responsible to select the access control method for the cafeteria.

There are a few conditions for giving access to the employees, which are as follows:

1. Top level management can get access any time.

2. Staff members can get access during the specified hours.

3. Guests can get access only in working hours.

Which of the following access control methods is suitable to accomplish the task?

A.

Discretionary access control

B.

Lattice-based access control

C.

Attribute-based access control

D.

Rule-based access control

Fill in the blank with the appropriate term.

________ is a powerful and low-interaction open source honeypot.