Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

G2700 GIAC Certified ISO-2700 Specialist Practice Test Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC G2700 GIAC Certified ISO-2700 Specialist Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 7
Total 453 questions

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Hybrid attack

B.

Brute Force attack

C.

Dictionary attack

D.

Rule based attack

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cost of lost income from missed sales

B.

Sales aspect of the business

C.

Cost of low productivity

D.

Innovations in electronic funds transfer

Which of the following are process elements for remote diagnostics?

Each correct answer represents a complete solution. Choose all that apply.

A.

After detected performance degradation, predict the failure moment by extrapolation.

B.

Remotely monitor selected vital system parameters.

C.

Compare with known or expected behavior data.

D.

Perform analysis of data to detect trends.

Which of the following refers to the process of adjusting the capacity of a company to meet the changed or predicted demands?

A.

Business continuity planning

B.

Capacity planning

C.

DR planning

D.

ER planning

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

A.

Mandatory Access Control

B.

Task-based Access Control

C.

Discretionary Access Control

D.

Role-Based Access Control

You work as an Information Security Manager for uCertify Inc. The company is releasing the documentation about a software product. You have been assigned the task to include information about the company in a legal disclaimer before releasing the documentation. What is the purpose of using the legal disclaimer?

A.

To advertise the product

B.

To identify the usage of the documentation

C.

To protect organizations against libel actions

D.

To ensure the security of the documentation

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

A.

Business Continuity Planning

B.

Change Management

C.

Social engineering

D.

Configuration Management

Which of the following policies defines the goals and elements of an organization's computer systems?

A.

Public

B.

Corporate

C.

Human resource

D.

Computer security

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

A.

$67,250

B.

$92,600

C.

$72,650

D.

$68,250

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to assign ownership of some assets of the organization. Which of the following statements correctly describe the responsibilities of an asset owner?

Each correct answer represents a complete solution. Choose all that apply.

A.

The owner is allowed to delegate accountability of the asset.

B.

The owner should have a document describing the security controls for the asset.

C.

The owner is allowed to delegate responsibility for maintaining the asset.

D.

The owner has property rights to the asset.

Which of the following individuals calculates the recovery time and cost estimates while performing a business impact analysis (BIA)?

A.

Business process owner

B.

Business continuity coordinator

C.

Risk Executive

D.

Information security manager

Fill in the blank with the appropriate term.

______is a prime example of a high-interaction honeypot.

Fill in the blank with an appropriate phrase.

The______ is concerned with rebuilding production processing and determining the criticality of data.

A.

recovery team

You work as a Security Professional for uCertify Inc. You have been assigned the task to calculate the Recovery Time Objective for particular outage duration. Which of the following should be included in the Recovery Time Objective?

Each correct answer represents a complete solution. Choose all that apply.

A.

Running applications back online

B.

Recovering data

C.

Fault detection

D.

Sales estimation

Mark works as a Security Administrator for uCertify Inc. Somehow Mark comes to know that an employee is keeping illegal software on his workstation. After investigating, Mark finds that this is indeed true. Therefore, Mark decides to file a law suit against the organization, as it is against organization's norms to store illegal information. Now, the organization decides to call the police and suspend Mark from work till further internal inquiries. Which of the following practices has been implemented in this scenario?

A.

Due diligence

B.

Due process

C.

Privacy

D.

Due care

Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?

A.

Medium-interaction honeypot

B.

Honeyd

C.

High-interaction honeypot

D.

Low-interaction honeypot

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-docheck- act)?

Each correct answer represents a complete solution. Choose all that apply.

A.

It manages resources that are required to achieve a goal.

B.

It determines controls and their objectives.

C.

It performs security awareness training.

D.

It detects and responds to incidents properly.

E.

It operates the selected controls.

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to

submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

A.

Asset Value

B.

Single Loss Expectancy

C.

Annualized Rate of Occurrence

D.

Number of employees in the company

As an attacker, you are sending very small sized packets with durations of 15 minutes per packet to the IIS Web server. Since an IIS session remains alive for a long time, the IDS may be tricked into accepting them as regular packet transformations. Which of the following types of attacking methods are you using?

A.

Session splicing

B.

Nonblind spoofing

C.

Session hijacking

D.

Security Logging

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

A.

Privacy law

B.

Copyright law

C.

Security law

D.

Trademark law

Page: 4 / 7
Total 453 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved