GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test
Which of the following are the steps of the Do stage of the project?
Each correct answer represents a part of the solution. Choose all that apply.
You work as a Security Administrator for uCertify Inc. You are working on a disaster recovery plan. According to the plan, the remote site B will hold a copy of data that is 2 hours behind the production data at site A. It will take 4 hours after a downtime at site A to decide to shift production to site B. An additional 40 minutes will be needed to bring up the network and redirect users so that the site B can become productive. What is the RPO of the plan?
You work as an Information Security Manager for uCertify Inc. You are implementing an asset management strategy. Which of the following should you include in your strategy to make it effective?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Security Administrator for uCertify Inc. You have been assigned a task to provide a solution that has a striped set with distributed parity or interleave parity. Which of the following will help you to meet the organizational requirements?
Which of the following defines the interdependent relationships among the internal support groups of an organization working to support a Service Level Agreement?
You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of using change management?
Each correct answer represents a complete solution. Choose all that apply.
You work as an Information Security Manager for uCertify Inc. The company is releasing the documentation about a software product. Which of the following documents is required by the company to protect it against a libel action if information is corrupted, lost, and destroyed?
NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps?
Each correct answer represents a complete solution. Choose two.
Which of the following types of software is used by organizations to arrange for different passwords on different systems to have the same value when they belong to the same person?
Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?
