Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 4 / 14
Total 453 questions

An audit trail is an example of which of the following types of control?

A.

Detective control

B.

Application control

C.

Preventive control

D.

Deterrent control

Which of the following is NOT a module of FaultTree+?

A.

Kerchief Analysis

B.

Fault Tree Analysis

C.

Event Tree Analysis

D.

Markov Analysis

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

A.

Attribute-based access control

B.

Rule-based access control

C.

Discretionary access control

D.

Mandatory access control

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

A.

It is the slowest method for taking a data backup.

B.

It is the fastest method of backing up data.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Resumption of applications

B.

Resumption of hardware

C.

Resumption of data

D.

Resumption of sales

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the classification of information assets. Which of the following controls of the ISO standard provides guidelines on the classification of information?

A.

Control A.7.1.3

B.

Control A.7.1.2

C.

Control A.7.2

D.

Control A.7.2.1

You work as a Security Administrator for uCertify Inc. You have been assigned a task for helping employees in determining appropriate technical security measures available for electronic information that is deemed sensitive. Which of the following policies will you apply to accomplish the task?

A.

Default policy

B.

Enterprise policy

C.

Information security policy

D.

Security policy

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

A.

Risk acceptance

B.

Risk transference

C.

Risk avoidance

D.

Risk mitigation

Sam is the CEO of Gentech Inc. The company is located in New York. He has to start a new project in order to increase the overall revenue of the company. Sam has to develop an ISMS policy. In which of the following phases of the PDCA cycle will Sam accomplish the task?

A.

Do

B.

Plan

C.

Act

D.

Check