Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

GIAC Certified ISO-2700 Specialist Practice Test Question and Answers

GIAC Certified ISO-2700 Specialist Practice Test

Last Update May 19, 2024
Total Questions : 453

We are offering FREE G2700 GIAC exam questions. All you do is to just go and sign up. Give your details, prepare G2700 free exam questions and then go for complete pool of GIAC Certified ISO-2700 Specialist Practice Test test questions that will help you more.

G2700 pdf

G2700 PDF

$35  $99.99
G2700 Engine

G2700 Testing Engine

$42  $119.99
G2700 PDF + Engine

G2700 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following refers to the amount of downtime that a business can endure to survive?

Options:

A.  

RTA

B.  

RTO

C.  

BCP

D.  

RPO

Discussion 0
Questions 2

Which of the following considerations should be kept in mind while working on the business continuity planning process?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Clustering

B.  

Network connectivity

C.  

Facilities

D.  

SLA

Discussion 0
Questions 3

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.  

$72,650

B.  

$67,250

C.  

$68,250

D.  

$92,600

Discussion 0
Questions 4

Which of the following plans provides measures for disseminating status report to personnel and the public?

Options:

A.  

Contingency plan

B.  

Disaster recovery plan

C.  

Business continuity plan

D.  

Crisis communication plan

Discussion 0
Questions 5

What is the order of the steps in the incident cycle?

Options:

A.  

Incident, Threat, Damage, Recovery

B.  

Incident, Recovery, Damage, Threat

C.  

Threat, Damage, Incident, Recovery

D.  

Threat, Incident, Damage, Recovery

Discussion 0
Questions 6

You work as a Security Professional for uCertify Inc. You are working on a Disaster Recovery Plan (DRP). Which of the following are basic functions of DRP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It protects an organization from major computer services failure.

B.  

It guarantees the reliability of standby systems through testing and simulation.

C.  

It resists the same disaster to come in the future.

D.  

It minimizes decision-making required by personnel during a disaster.

Discussion 0
Questions 7

Which of the following are the rights that are given to the person who has processed data?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

To require that their data is used for direct marketing

B.  

To view the data an organization holds on them, for a small fee, known as 'subject access f ee'

C.  

To require that data is not used in any way that may potentially cause damage or distress

D.  

To request that incorrect information be corrected

Discussion 0
Questions 8

Which of the following elements of the PDCA (Plan-Do-Check-Act) methodology describes the objectives and processes required to deliver results according to the customer requirements and the organization's policies?

Options:

A.  

Act

B.  

Do

C.  

Check

D.  

Plan

Discussion 0
Questions 9

Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Calculate

B.  

Act

C.  

Plan

D.  

Deviate

Discussion 0
Questions 10

David works as the Network Administrator for Blue Well Inc. One of his tasks is to develop and maintain risk management plan. Which of the following are the objectives of risk management plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Eliminating risks

B.  

Accepting risks cautiously that cannot be eliminated

C.  

Developing required risks

D.  

Transferring risks by insurance

Discussion 0
Questions 11

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

Options:

A.  

Sharpen

B.  

Soften

C.  

Blur

D.  

Rotate

Discussion 0
Questions 12

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations security. Which of the following controls of the ISO standard deals with equipment security?

Options:

A.  

Control

A.  

8.1

B.  

Control A.10.1

C.  

Control A.7.1

D.  

Control A.9.2

Discussion 0
Questions 13

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

Options:

A.  

Risk transference

B.  

Risk avoidance

C.  

Risk acceptance

D.  

Risk mitigation

Discussion 0
Questions 14

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It is the fastest method of backing up data.

B.  

It backs up the entire database, including the transaction log.

C.  

It is the slowest method for taking a data backup.

D.  

It backs up only the files changed since the most recent backup and clears the archive bit.

Discussion 0
Questions 15

Which of the following phases of the PDCA model is the monitoring and controlling phase of the Information Security Management System (ISMS)?

Options:

A.  

Act

B.  

Do

C.  

Check

D.  

Plan

Discussion 0
Questions 16

Service Level Agreement (SLA) provides one service for all customers of that service. Which of the following are the contents included by SLAs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Vocations

B.  

Mutual responsibilities

C.  

Scope

D.  

Service description

Discussion 0
Questions 17

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.  

Human resource security

B.  

Personal security

C.  

Physical security

D.  

Network Security

Discussion 0
Questions 18

Which of the following states that a user should never be given more privileges than are required to carry out a task?

Options:

A.  

Principle of least privilege

B.  

Segregation of duties

C.  

Security through obscurity

D.  

Role-based security

Discussion 0
Questions 19

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

Options:

A.  

The IT Service Continuity Manager

B.  

The Configuration Manager

C.  

The Supplier Manager

D.  

The Service Catalogue Manager

Discussion 0
Questions 20

How many modules are there in FaultTree+?

Options:

A.  

6

B.  

5

C.  

3

D.  

4

Discussion 0
Questions 21

Which of the following international information security standards is concerned with anticipating and responding to information security breaches?

Options:

A.  

Organization of information security

B.  

Information security incident management

C.  

Physical and environmental security

D.  

Risk assessment and treatment

Discussion 0
Questions 22

Qualitative risk analysis includes judgment, intuition, and experience. Which of the following methods are used to perform qualitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Egress filtering

B.  

Checklists

C.  

Delphi technique

D.  

Brainstorming

Discussion 0
Questions 23

The stronger points of CRAMM assist prioritization by providing a countermeasure with high priority if some conditions are met. Which of the following are these conditions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It requires protecting a high risk system.

B.  

It does not require the installation of alternative countermeasures.

C.  

It is inexpensive to implement.

D.  

It provides protection against several threats.

Discussion 0
Questions 24

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations management. Which of the following controls of the ISO standard is concerned with operational procedures and responsibilities?

Options:

A.  

Control

A.  

10.1

B.  

Control A.7.1

C.  

Control A.8.1

D.  

Control A.9.2

Discussion 0
Questions 25

Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?

Options:

A.  

Honeypot

B.  

Internet bot

C.  

Crawler

D.  

Spider

Discussion 0
Questions 26

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to assign ownership of some assets of the organization. Which of the following statements correctly describe the responsibilities of an asset owner?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

The owner has property rights to the asset.

B.  

The owner is allowed to delegate responsibility for maintaining the asset.

C.  

The owner should have a document describing the security controls for the asset.

D.  

The owner is allowed to delegate accountability of the asset.

Discussion 0
Questions 27

Which of the following tasks are performed by Information Security Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It is designed to protect information and any equipment that is used in connection with its storage, transmission, and processing.

B.  

It is designed to develop information and any equipment that is used in connection with its storage, transmission, and processing.

C.  

It is designed to recognize information and any equipment that is used in connection with its storage, transmission, and processing.

D.  

It is designed to control information and any equipment that is used in connection with its storage, transmission, and processing.

Discussion 0
Questions 28

You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.

Which of the following are the main objectives of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Minimal disruption of services

B.  

Reduction of inventory in accordance with revenue

C.  

Economic utilization of resources involved in the change

D.  

Reduction in back-out activities

Discussion 0
Questions 29

Cigital Risk Management Method was developed by Gary McGraw of Cigital and John Viega of Stonewall Software, and it defines software security risk management process. Choose and re-order the risk management steps that are included in this method.

Options:

A.  

Discussion 0
Questions 30

John works as a Security Administrator for uCertify Inc. As per his past experience, he wants to make a policy stating that any hardware devices containing information about the organization should be destroyed properly before they are thrown. After applying this policy, John will be able to ensure that the information on the devices will not fall into the hands of unauthorized persons after properly discarding the devices.

Which of the following types of policies is John going to create?

Options:

A.  

Due Care

B.  

Privacy

C.  

Disposal and destruction

D.  

Security

Discussion 0
Questions 31

Which of the following tools can be used to detect steganography?

Options:

A.  

Dskprobe

B.  

ImageHide

C.  

Blindside

D.  

Snow

Discussion 0
Questions 32

Which of the following are steps of vulnerability management programs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Prioritize Vulnerabilities

B.  

Baseline the Environment

C.  

Shield and monitor

D.  

Define Policy

Discussion 0
Questions 33

Which of the following are security design principles required for information protection?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Closed design

B.  

Least privilege

C.  

Separation of duties

D.  

Complete meditation

Discussion 0
Questions 34

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.  

Downtime

B.  

Uptime

C.  

Slowtime

D.  

Peaktime

Discussion 0
Questions 35

Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?

Options:

A.  

Business Impact Analysis (BIA)

B.  

Continual Service Improvement (CSI)

C.  

Recovery Point Objective (RPO)

D.  

Business Continuity Plan (BCP)

Discussion 0
Questions 36

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of ISMS. Which of the following steps are concerned with the development of ISMS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Risk management

B.  

Selection of appropriate controls

C.  

HR security planning

D.  

Statement of Applicability

Discussion 0
Questions 37

Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?

Options:

Discussion 0
Questions 38

What does CRAMM stand for?

Options:

A.  

Continuous Risk Analysis and Management Method

B.  

CCTA Risk Analysis and Management Method

C.  

Continuous Risk Analyzer and Manager Methodology

D.  

CCTA Risk Analyzer and Manager Methodology

Discussion 0
Questions 39

Mark works as a Network Security Administrator for uCertify Inc. He wants to implement a firewall technique over the network to inspect each packet passing through the network and to accept or reject it, based on user-defined rules. Which of the following types of firewall techniques is implemented by Mark to accomplish the task?

Options:

A.  

Application gateway

B.  

Proxy server

C.  

Circuit-level gateway

D.  

Packet filter

Discussion 0
Questions 40

Which of the following policies defines the acceptable methods of remotely connecting a system to the internal network?

Options:

A.  

Remote access policy

B.  

Computer security policy

C.  

Network security policy

D.  

User Account Policy

Discussion 0
Questions 41

Which of the following types of viruses is placed into the first sector of the hard drive?

Options:

A.  

Multipartite

B.  

Master boot record

C.  

File

D.  

Boot sector

Discussion 0
Questions 42

Which of the following paragraphs of the Turnbull Report stated that a company's system of internal control will include information and communication processes?

Options:

A.  

Paragraph 28

B.  

Paragraph 20

C.  

Paragraph 21

D.  

Paragraph 22

Discussion 0
Questions 43

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.  

Packet sniffing

B.  

Spoofing

C.  

Cryptanalysis

D.  

Steganography

Discussion 0
Questions 44

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.  

Steganography

B.  

Email spoofing

C.  

Web ripping

D.  

Social engineering

Discussion 0
Questions 45

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Install the IAS server on the system to verify Internet related activities.

B.  

Install the RADIUS server to check the authentication of the invader.

C.  

Install the application that is designed to record the activities of the invader.

D.  

Install the operating system without patches installed and use typical defaults and options.

Discussion 0
Questions 46

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Resumption of hardware

B.  

Resumption of data

C.  

Resumption of sales

D.  

Resumption of applications

Discussion 0
Questions 47

You work as an Information Security Manager for uCertify Inc. You are working on an asset management plan for protecting software tools used in your organization. Which of the following are included in Software Asset Management (SAM)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Maintaining software license compliance

B.  

Tracking inventory and software asset use

C.  

Maintaining standard policies and procedures

D.  

Tracking issues related with IT equipment

Discussion 0
Questions 48

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Recovering data

B.  

Sales estimation

C.  

Running applications back online

D.  

Fault detection

Discussion 0
Questions 49

You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?

Options:

A.  

Implement least privileges.

B.  

Implement RBAC.

C.  

Implement three way authentication.

D.  

Implement separation of duties.

Discussion 0
Questions 50

Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?

Options:

A.  

DDoS

B.  

Logic bomb

C.  

Sabotage

D.  

Smurf

Discussion 0
Questions 51

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

Options:

A.  

Risk mitigation

B.  

Risk acceptance

C.  

Risk avoidance

D.  

Risk transference

Discussion 0
Questions 52

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Options:

A.  

Impersonation attack

B.  

Third-party authorization attack

C.  

Important user posing attack

D.  

In person attack

Discussion 0
Questions 53

You work as a Network Security Administrator for uCertify Inc. Your organization has set up a new Internet connection in place of the previous one. It is your responsibility to ensure that employees use the Internet only for official purposes. While reviewing Internet usages, you find that a few people have traversed and downloaded some inappropriate and illegal information. You want to make a policy to stop all these activities in the future. Which of the following policies will you implement to accomplish the task?

Options:

A.  

Security policy

B.  

Privacy policy

C.  

Acceptable use policy

D.  

Due care policy

Discussion 0
Questions 54

Which of the following paragraphs of the Turnbull Report stated that a company's internal control system encompasses the policies, processes, tasks, behaviors, and other aspects of the company?

Options:

A.  

Paragraph 20

B.  

Paragraph 21

C.  

Paragraph 28

D.  

Paragraph 22

Discussion 0
Questions 55

Which of the following statements is true about annualized loss expectancy?

Options:

A.  

It is defined as the cost related to a single realized risk against a particular asset.

B.  

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

C.  

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.  

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

Discussion 0
Questions 56

Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?

Options:

A.  

UDP

B.  

SMTP

C.  

ICMP

D.  

SNMP

Discussion 0
Questions 57

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.

B.  

It enables mass surveillance of communications in transit.

C.  

It enables certain private bodies to demand that someone hand over keys to protected information.

D.  

It allows certain public bodies to monitor people's Internet activities.

Discussion 0
Questions 58

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?

Options:

A.  

Disaster Recovery Plan

B.  

Cyber Incident Response Plan

C.  

Occupant Emergency Plan

D.  

Crisis Communication Plan

Discussion 0
Questions 59

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Sales aspect of the business

B.  

Cost of low productivity

C.  

Innovations in electronic funds transfer

D.  

Cost of lost income from missed sales

Discussion 0
Questions 60

Which of the following are the basics of Business Continuity Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Implementation of a risk assessment technique to identify the causes and consequences of failures

B.  

Regular checking of business continuity plans

C.  

Identification of authentication techniques according to the requirements

D.  

Identification of human resources according to the requirements

Discussion 0
Questions 61

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

Options:

A.  

Classification of owners

B.  

Usage of information

C.  

Identification of inventory

D.  

Classification of information

Discussion 0
Questions 62

The disciplined and structured process, that integrates information security and risk management activities into the System Development Life Cycle, is provided by the risk management framework.

Choose the appropriate RMF steps.

Options:

A.  

Discussion 0
Questions 63

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Risk identification

B.  

Security Threat

C.  

Project schedule

D.  

Team members list

E.  

Risk analysis

Discussion 0
Questions 64

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.  

Network Security

B.  

Physical security

C.  

Access security

D.  

Human resource security

Discussion 0
Questions 65

Which of the following is the element used in the technology of encrypting and decrypting the text in cryptography?

Options:

A.  

Cipher

B.  

Key

C.  

Plaintext

D.  

Encryption

Discussion 0
Questions 66

Which of the following surveys found that the smaller organizations had had a better understanding of their information assets?

Options:

A.  

Information Security Breaches Survey (ISBS) 2006

B.  

KPMG's Information Security Survey 2000

C.  

DTI Survey

D.  

CBI Cyber Crime Survey

Discussion 0
Questions 67

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the usage of information assets. Which of the following controls of the ISO standard deals with the documentation and implementation of rules for the acceptable use of information assets?

Options:

A.  

Control

A.  

7.2.1

B.  

Control A.7.1.2

C.  

Control A.7.1.3

D.  

Control A.7.2

Discussion 0