GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test
Which of the following is used to hide the existence of a message from a third party?
A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.
What type of attack has just occurred?
Which of the following statements are true about Regulation of Investigatory Powers Act 2000?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?
Which of the following paragraphs of the Turnbull Guidance provide clear description of the principles of a risk treatment plan?
Each correct answer represents a complete solution. Choose all that apply.
By gaining full control of a router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack routers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?
Which of the following statements is true about annualized rate of occurrence?
You work as the Network Security Administrator for uCertify Inc. The organization is using an intranet to distribute information to its employees. A database residing on the network contains employees' information, such as employee name, designation, department, phone extension, date of birth, date of joining, etc. You are concerned about the security because the database has all information about employees, which can help an unauthorized person to recognize an individual. Which Personally Identifiable Information should be removed from the database so that the unauthorized person cannot identify an individual?
Mark works as a Security Administrator for uCertify Inc. He is responsible to update Standard Operating Procedures (SOPs) in his organization. In this process, Mark needs to update many programs and modify some registry files in the operating system. He wants to make a document of each step taken by him, so that he can come back and restore the system to its actual state if any problem occurred in the update. Which type of document should Mark create to accomplish the task?
