Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

G2700 GIAC Certified ISO-2700 Specialist Practice Test Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC G2700 GIAC Certified ISO-2700 Specialist Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 7 / 7
Total 453 questions

Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

A.

It is the fastest method of backing up data.

B.

It backs up the entire database, including the transaction log.

C.

It is the slowest method for taking a data backup.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Which of the following Acts, enacted in the United States, amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A.

The USA Patriot Act of 2001

B.

Civil Rights Act of 1991

C.

Sexual Predators Act

D.

PROTECT Act

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

A.

Data custodian

B.

User

C.

Auditor

D.

Data owner

Which of the following are the activities of Incident Management?

Each correct answer represents a complete solution. Choose all that apply.

A.

Incident closure

B.

Incident detection and recording

C.

Classification and initial support

D.

Investigation and diagnosis

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

A.

Personal data

B.

Electricity

C.

Reputation of the company

D.

Equipment

Which of the following are the goals of cryptography?

Each correct answer represents a complete solution. Choose all that apply.

A.

Authentication

B.

Authorization

C.

Data integrity

D.

Confidentiality

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

A.

Attribute-based access control

B.

Mandatory access control

C.

Discretionary access control

D.

Rule-based access control

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

A.

The options are identified and evaluated for the treatment of the risks.

B.

Training and awareness programs for affected staff are scheduled.

C.

The risk treatment plan is implemented and controls are planned.

D.

Operations and resources are managed.

Which of the following groupings is correct regarding security measures?

A.

Physical, logical, preventive, detective

B.

Preventive, detective, repressive, corrective

C.

Logical, repressive, preventive, corrective

D.

Organizational, preventive, corrective, physical

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to establish ISO standards for your organization. Which of the following standards provides guidelines on specifications and use of measurement techniques for the assessment of the effectiveness of an implemented information security management system and controls?

A.

BS7799

B.

ISO 27001

C.

ISO 9001

D.

ISO 27004

David works as the Network Administrator for uCertify Inc. He has been assigned the task to analyze and manage risks in the computer network of the organization. Which of the following are the stages of the CRAMM review that David will go through?

Each correct answer represents a complete solution. Choose all that apply.

A.

To identify and prioritize countermeasures

B.

To identify threats and vulnerabilities and calculate risks

C.

To remove risks and install antivirus

D.

To identify and value assets

For which of the following can risk analysis be used?

A.

Reducing risks to an acceptable level in conjunction with security measures

B.

Expressing the value of information for an organization in terms of money

C.

Ensuring that security measures are deployed in a cost-effective fashion

D.

Clarifying management about their responsibilities

Which of the following refers to the amount of downtime that a business can endure to survive?

A.

RTA

B.

RTO

C.

BCP

D.

RPO

You work as a Security Administrator for uCertify Inc. You need to define security controls regarding the network of the organization. Which of the following information security standards deals with the management of technical security controls in systems and networks?

A.

Asset management

B.

Organization of information security

C.

Information security incident management

D.

Communications and operations management

Page: 7 / 7
Total 453 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved