Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

G2700 GIAC Certified ISO-2700 Specialist Practice Test Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC G2700 GIAC Certified ISO-2700 Specialist Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 7
Total 453 questions

Which of the following are features of protocol and spectrum analyzers?

Each correct answer represents a complete solution. Choose all that apply.

A.

A protocol analyzer can identify physical layer errors in a network switch.

B.

A packet analyzer can be used to capture real-time packets and can monitor the network packets on the LAN and the Internet.

C.

A protocol analyzer can be used to analyze network traffic to trace specific transactions.

D.

A spectrum analyzer should have the sensitive measuring equipment capability for detecting waveform frequencies and can identify and locate the interfering transmitter.

Business Continuity Planning (BCP) determines the risks to the organizational processes and creates policies, plans, and procedures in order to minimize the impact of those risks. What are the different steps in the Business Continuity Planning process?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Business Analysis

B.

Continuity planning

C.

Project scope and planning

D.

Approval and implementation

E.

Business Impact Assessment

Which of the following standards was made in 1995 by the joint initiative of the Department of Trade and Industry in the United Kingdom and leading UK private-sector businesses?

A.

BS7799

B.

ISO 27001

C.

BS2700

D.

ISMS

Which of the following operations are performed by the Identity Management Process?

Each correct answer represents a complete solution. Choose all that apply.

A.

Providing Single Sign-On access

B.

Making possible automated application provision

C.

Provisioning and coordinating user identities

D.

Ensuring secure deployment of applications

John works as an IT Technician for uCertify Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

A.

DoS

B.

Trojan horse

C.

Social engineering

D.

Replay attack

Which of the following is a technical measure?

A.

Encryption of data

B.

Creation of a policy that defines what is and what is not permitted in the e-mail

C.

Allocation of information to an owner

D.

Storage of system management passwords

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

A.

Network Security

B.

Physical security

C.

Access security

D.

Human resource security

You work as the Human Resource Manager for uCertify Inc. You need to recruit some candidates for the marketing department of the organization. Which of the following should be defined to the new employees of the organization before they have joined?

Each correct answer represents a complete solution. Choose all that apply.

A.

Marketing tips and tricks

B.

Organization's network topology

C.

Job roles

D.

Organization's security policy

Which of the following controls are administrative in nature?

A.

Directive controls

B.

Recovery controls

C.

Preventive controls

D.

Detective controls

The disciplined and structured process, that integrates information security and risk management activities into the System Development Life Cycle, is provided by the risk management framework.

Choose the appropriate RMF steps.

A.

Choose and reorder the appropriate steps that you will take to perform auditing.

A.

Which of the following information security standards deals with the protection of the computer facilities?

A.

Physical and environmental security

B.

Compliance

C.

Organization of information security

D.

Risk assessment and treatment

Which of the following states that a user should never be given more privileges than are required to carry out a task?

A.

Principle of least privilege

B.

Role-based security

C.

Security through obscurity

D.

Segregation of duties

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

A.

Classification of owners

B.

Usage of information

C.

Identification of inventory

D.

Classification of information

Which of the following phases of the PDCA model is the monitoring and controlling phase of the Information Security Management System (ISMS)?

A.

Check

B.

Plan

C.

Do

D.

Act

Mark works as a Security Administrator for uCertify Inc. For the last few days, he is getting an error message, i.e., 'Remove the Boot.ini file because it is harmful for operating system'. When Mark reads about the Boot.ini file, he finds that it is a system file that is used to load the operating system on a computer. Which of the following types of virus has attacked Mark's computer?

A.

Polymorphic

B.

Hoax

C.

Macro

D.

Multipartite

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Linguistic steganography

B.

Text Semagrams

C.

Technical steganography

D.

Perceptual masking

Which of the following are the basics of Business Continuity Management?

Each correct answer represents a complete solution. Choose all that apply.

A.

Implementation of a risk assessment technique to identify the causes and consequences of failures

B.

Regular checking of business continuity plans

C.

Identification of authentication techniques according to the requirements

D.

Identification of human resources according to the requirements

Which of the following is also known as the 'Code for Information Security'?

A.

ISO/IEC 20002 standard

B.

ISO/IEC 27001:2005 standard

C.

ISO/IEC 27002:2005 standard

D.

ISO/IEC 20000 standard

Which of the following is a Restrict Anonymous registry value that allows users with explicit anonymous permissions?

A.

2

B.

3

C.

1

D.

0

Page: 1 / 7
Total 453 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved