Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 6 / 14
Total 453 questions

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

A.

Personal security

B.

Network Security

C.

Physical security

D.

Human resource security

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts. There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a policy to enter their personal email id while logged in to the system.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a new policy that forces users to change their passwords once every 15 days.

Which of the following types of cyberstalking damages the reputation of their victim and turns other people against them by setting up their own Websites, blogs, or user pages for this purpose?

A.

False accusation

B.

False victimization

C.

Encouraging others to harass the victim

D.

Attempts to gather information about the victim

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Linguistic steganography

B.

Technical steganography

C.

Perceptual masking

D.

Text Semagrams

Which of the following are the primary rules defined for RBAC?

Each correct answer represents a complete solution. Choose all that apply.

A.

Role authorization

B.

Transaction authorization

C.

Role assignment

D.

Transaction assignment

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

A.

Risk avoidance

B.

Risk mitigation

C.

Risk transference

D.

Risk acceptance

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

A.

Developing risk management plan to identify risks based on documents

B.

Developing project charter and risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Identifying and analyzing risk events using qualitative and quantitative techniques

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Steganography

B.

Email spoofing

C.

Web ripping

D.

Social engineering

Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?

A.

UDP

B.

SMTP

C.

ICMP

D.

SNMP