Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

G2700 GIAC Certified ISO-2700 Specialist Practice Test Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC G2700 GIAC Certified ISO-2700 Specialist Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 7
Total 453 questions

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

A.

It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.

B.

It enables mass surveillance of communications in transit.

C.

It enables certain private bodies to demand that someone hand over keys to protected information.

D.

It allows certain public bodies to monitor people's Internet activities.

David works as the Network Administrator for uCertify Inc. He has been asked to perform risk analysis. He decides to do it by using CRAMM. The CEO wants to know the negative points of CRAMM which is going to be used by David. Which of the following points will David tell the CEO of the organization?

A.

It maintains consistency that results from similar solutions for similar risk profiles.

B.

It regularly updates extensive hierarchical countermeasure databases covering non-technical areas.

C.

It requires qualified and experienced practitioners to use it.

D.

It helps in developing full reviews and rapid reviews.

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

A.

Brute Force attack

B.

War dialing attack

C.

Social Engineering attack

D.

Replay attack

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

A.

System state data

B.

Users manual

C.

DNS record

D.

Cache memory

Which of the following statements is true about annualized rate of occurrence?

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?

A.

Configuration Management

B.

Business Continuity Planning

C.

Social engineering

D.

Change Management

Which of the following statements is true about annualized loss expectancy?

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

A.

It is the slowest method for taking a data backup.

B.

It is the fastest method of backing up data.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

You work as a Network Security Administrator for uCertify Inc. Your organization has set up a new Internet connection in place of the previous one. It is your responsibility to ensure that employees use the Internet only for official purposes. While reviewing Internet usages, you find that a few people have traversed and downloaded some inappropriate and illegal information. You want to make a policy to stop all these activities in the future. Which of the following policies will you implement to accomplish the task?

A.

Acceptable use policy

B.

Privacy policy

C.

Security policy

D.

Due care policy

What is the name given to the system that guarantees the coherence of information security in the organization?

A.

Information Security Management System

B.

Rootkit

C.

Stemkit

D.

Security regulations for special information for the government

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

A.

At every status meeting of the project team, project risk management is an agenda item.

B.

Project risk management is scheduled for every month in the 18-month project.

C.

Project risk management happens at every milestone.

D.

Project risk management has been concluded with the project planning.

Which of the following are the primary rules defined for RBAC?

Each correct answer represents a complete solution. Choose all that apply.

A.

Role authorization

B.

Transaction authorization

C.

Role assignment

D.

Transaction assignment

Which of the following standard file formats is used by Apple's iPod to store contact information?

A.

vCard

B.

hCard

C.

HFS+

D.

FAT32

By gaining full control of a router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack routers?

Each correct answer represents a complete solution. Choose all that apply.

A.

Launching a Max Age attack

B.

Route table poisoning

C.

Launching a Sequence++ attack

D.

Launching a social engineering attack

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

A.

Risk avoidance

B.

Risk mitigation

C.

Risk transference

D.

Risk acceptance

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Snooping

B.

Copyright

C.

Patent

D.

Utility model

You work as the project manager for Bluewell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decide, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project, what is

likely to increase?

A.

Human resource needs

B.

Risks

C.

Costs

D.

Quality control concerns

Which of the following laws or acts enforces the prohibition against cyber stalking?

A.

Malicious Communications Act (1998)

B.

Anti-Cyber-Stalking law (1999)

C.

Stalking Amendment Act (1999)

D.

Stalking by Electronic Communications Act (2001)

Which of the following paragraphs of the Turnbull Report stated that a company's system of internal control will include information and communication processes?

A.

Paragraph 28

B.

Paragraph 20

C.

Paragraph 21

D.

Paragraph 22

Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?

A.

UDP

B.

SMTP

C.

ICMP

D.

SNMP

Page: 5 / 7
Total 453 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved