Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 2 / 14
Total 453 questions

You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?

Each correct answer represents a complete solution. Choose all that apply.

A.

Centralized reporting for compliance adherence

B.

Reducing IT costs due to lower number of IT help desk calls about passwords

C.

Reduces phishing success, because users are not trained to enter password everywhere without thinking

D.

Reduces the user experience

Which of the following is the right approach for the identification and management of information security risks?

A.

Encryption of system state data

B.

Storage of topology records

C.

Establishment and continuous update of ISMS

D.

Indication of natural disaster

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

A.

Business Continuity Planning

B.

Change Management

C.

Social engineering

D.

Configuration Management

Which of the following are the various types of security measures?

Each correct answer represents a complete solution. Choose all that apply.

A.

Reductive

B.

Preventive

C.

Quantitative

D.

Qualitative

The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the Information Security Officer?

A.

Carry out an evaluation.

B.

Formulate information security policy.

C.

Carry out a risk analysis.

D.

Set up monitoring.

Which of the following types of viruses is placed into the first sector of the hard drive?

A.

Multipartite

B.

Master boot record

C.

File

D.

Boot sector

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cost of lost income from missed sales

B.

Sales aspect of the business

C.

Cost of low productivity

D.

Innovations in electronic funds transfer

Which of the following specifies value of each asset?

A.

Asset importance

B.

Asset protection

C.

Asset responsibility

D.

Asset identification

Risk analysis provides a great deal of useful information. It has four main objectives. Which of the following is not an objective of risk analysis?

A.

To identify assets and their value

B.

To determine a balance between the costs of an incident and a security measure

C.

To determine vulnerabilities and threats

D.

To determine the costs of threats

You have just taken control over network administration services for a sales and marketing firm. The sales staff (consisting of 10 people) rely heavily on both phone and internet connections for business. You notice that the sales staff has a single T1 line handling their phone and internet connections. Which of the following would be the best suggestion for improving this situation?

A.

Move to fiber optic.

B.

Move them to a T3 line.

C.

Nothing, the system is fine as is.

D.

Add an additional T1 line for redundancy.