New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test

Page: 9 / 14
Total 453 questions

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

A.

The options are identified and evaluated for the treatment of the risks.

B.

Training and awareness programs for affected staff are scheduled.

C.

The risk treatment plan is implemented and controls are planned.

D.

Operations and resources are managed.

You work as a Security Administrator for uCertify Inc. You are working on a disaster recovery plan. According to the plan, the remote site B will hold a copy of data that is 2 hours behind the production data at site A. It will take 4 hours after a downtime at site A to decide to shift production to site B. An additional 40 minutes will be needed to bring up the network and redirect users so that the site B can become productive. What is the RPO of the plan?

A.

2 hours

B.

50 minutes

C.

4 hours

D.

40 minutes

You work as an Information Security Manager for uCertify Inc. You are implementing an asset management strategy. Which of the following should you include in your strategy to make it effective?

Each correct answer represents a complete solution. Choose all that apply.

A.

Software assets

B.

Organization's reputation

C.

Outage duration

D.

IT equipment

You work as a Security Administrator for uCertify Inc. You have been assigned a task to provide a solution that has a striped set with distributed parity or interleave parity. Which of the following will help you to meet the organizational requirements?

A.

RAID 5

B.

RAID 0

C.

RAID 10

D.

RAID 3/4

Which of the following defines the interdependent relationships among the internal support groups of an organization working to support a Service Level Agreement?

A.

Two-way Connection Agreement

B.

Non Disclosure Agreement

C.

Operational Level Agreement

D.

System Security Authorization Agreement

You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of using change management?

Each correct answer represents a complete solution. Choose all that apply.

A.

Improved estimates of the costs of proposed changes

B.

Reduced adverse impact of changes on the quality of IT services

C.

Maintenance of user passwords in a secure location

D.

Encryption of personal data when changing locations

You work as an Information Security Manager for uCertify Inc. The company is releasing the documentation about a software product. Which of the following documents is required by the company to protect it against a libel action if information is corrupted, lost, and destroyed?

A.

Non disclosure agreement

B.

Copyright

C.

Acknowledgement

D.

Legal disclaimer

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps?

Each correct answer represents a complete solution. Choose two.

A.

Awareness and Training Material Development

B.

Awareness and Training Material Implementation

C.

Awareness and Training Program Design

D.

Awareness and Training Material Effectiveness

Which of the following types of software is used by organizations to arrange for different passwords on different systems to have the same value when they belong to the same person?

A.

Self-service password reset software

B.

Web single signon software

C.

Password synchronization software

D.

Enterprise Single signon software

Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

A.

Supply chain management

B.

Inventory management

C.

Information security management

D.

Change management