Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

G2700 GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Questions 4

You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the identity of the employees recruited in your organization. Which of the following components of security deals with an employee's verification in the organization?

Options:

A.

Network Security

B.

Physical security

C.

Access security

D.

Human resource security

Buy Now
Questions 5

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?

Options:

A.

Classification of owners

B.

Usage of information

C.

Identification of inventory

D.

Classification of information

Buy Now
Questions 6

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk identification

D.

Risk control

Buy Now
Questions 7

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Human resource security deals with the employees handling personal data in an organization. Which section of ISO 27002 describes human resource security?

Options:

A.

Section 4

B.

Section 8

C.

Section 3

D.

Section 5

Buy Now
Questions 8

Which of the following is NOT a module of FaultTree+?

Options:

A.

Kerchief Analysis

B.

Fault Tree Analysis

C.

Event Tree Analysis

D.

Markov Analysis

Buy Now
Questions 9

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Uptime

B.

Slowtime

C.

Downtime

D.

Peaktime

Buy Now
Questions 10

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Text Semagrams

B.

Technical steganography

C.

Linguistic steganography

D.

Perceptual masking

Buy Now
Questions 11

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

Options:

A.

ALE=asset value ($)*exposure factor (EF)

B.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

C.

ALE=asset value ($)/exposure factor (EF)

D.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

Buy Now
Questions 12

You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of change management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Improved adverse impact of changes on the quality of IT services

B.

Improved IT personnel productivity, since there is a reduced number of urgent changes and a back-out of erroneous changes

C.

Improved productivity of users due to more stable and better IT services

D.

Increased ability to absorb frequent changes without making an unstable IT environment

Buy Now
Questions 13

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

Options:

A.

Attribute-based access control

B.

Rule-based access control

C.

Discretionary access control

D.

Mandatory access control

Buy Now
Questions 14

John works as a Security Administrator for uCertify Inc. As per his past experience, he wants to make a policy stating that any hardware devices containing information about the organization should be destroyed properly before they are thrown. After applying this policy, John will be able to ensure that the information on the devices will not fall into the hands of unauthorized persons after properly discarding the devices.

Which of the following types of policies is John going to create?

Options:

A.

Due Care

B.

Privacy

C.

Disposal and destruction

D.

Security

Buy Now
Questions 15

Which of the following types of viruses is placed into the first sector of the hard drive?

Options:

A.

Multipartite

B.

Master boot record

C.

File

D.

Boot sector

Buy Now
Questions 16

Which of the following plans provides measures and capabilities for recovering a major application or general support system?

Options:

A.

Disaster recovery plan

B.

Crisis communication plan

C.

Contingency plan

D.

Business continuity plan

Buy Now
Questions 17

Which of the following is the element used in the technology of encrypting and decrypting the text in cryptography?

Options:

A.

Cipher

B.

Key

C.

Plaintext

D.

Encryption

Buy Now
Questions 18

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the usage of information assets. Which of the following controls of the ISO standard deals with the documentation and implementation of rules for the acceptable use of information assets?

Options:

A.

Control A.7.2.1

B.

Control A.7.1.2

C.

Control A.7.1.3

D.

Control A.7.2

Buy Now
Questions 19

Which of the following are the two methods that are commonly used for applying mandatory access control?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Lattice-based access control

B.

Attribute-based access control

C.

Rule-based access control

D.

Discretionary access control

Buy Now
Questions 20

Which of the following statements is true about Return On Investment?

Options:

A.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

B.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

C.

It is the profit achieved through realization of improvements.

D.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

Buy Now
Questions 21

Which of the following tools can be used to detect steganography?

Options:

A.

Dskprobe

B.

ImageHide

C.

Blindside

D.

Snow

Buy Now
Questions 22

Which of the following surveys found that the smaller organizations had had a better understanding of their information assets?

Options:

A.

Information Security Breaches Survey (ISBS) 2006

B.

KPMG's Information Security Survey 2000

C.

DTI Survey

D.

CBI Cyber Crime Survey

Buy Now
Questions 23

The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?

Options:

A.

Deterrent control

B.

Detective control

C.

Preventive control

D.

Application control

Buy Now
Questions 24

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Human resource security

B.

Personal security

C.

Physical security

D.

Network Security

Buy Now
Questions 25

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

Options:

A.

Role-Based Access Control

B.

Task-based Access Control

C.

Discretionary Access Control

D.

Mandatory Access Control

Buy Now
Questions 26

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

Options:

A.

Mandatory Access Control

B.

Task-based Access Control

C.

Discretionary Access Control

D.

Role-Based Access Control

Buy Now
Questions 27

Which of the following states that a user should never be given more privileges than are required to carry out a task?

Options:

A.

Principle of least privilege

B.

Segregation of duties

C.

Security through obscurity

D.

Role-based security

Buy Now
Questions 28

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Utility model

B.

Cookie

C.

Trade secret

D.

Copyright

Buy Now
Questions 29

You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?

Options:

A.

RAID 1

B.

RAID 6

C.

RAID 5

D.

RAID 0

Buy Now
Questions 30

By gaining full control of a router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Launching a Max Age attack

B.

Route table poisoning

C.

Launching a Sequence++ attack

D.

Launching a social engineering attack

Buy Now
Questions 31

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts. There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

Options:

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a policy to enter their personal email id while logged in to the system.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a new policy that forces users to change their passwords once every 15 days.

Buy Now
Questions 32

Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?

Options:

A.

Risk mitigation

B.

Risk acceptance

C.

Risk avoidance

D.

Risk transference

Buy Now
Questions 33

You work as a System Administrator for uCertify Inc. You have been given the task to create a new corporate policy. Which of the following approaches must be followed to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strategic approach

B.

Approach to Risk Management

C.

Clear and unambiguous approach

D.

Industry best practice

Buy Now
Questions 34

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password.

What type of attack has just occurred?

Options:

A.

Brute Force attack

B.

War dialing attack

C.

Social Engineering attack

D.

Replay attack

Buy Now
Questions 35

In which of the following social engineering attacks does an attacker first damage any part of the target's equipment and then advertise himself as an authorized person who can help fix the problem.

Options:

A.

Impersonation attack

B.

Reverse social engineering attack

C.

Important user posing attack

D.

In person attack

Buy Now
Questions 36

Which of the following laws or acts enforces the prohibition against cyber stalking?

Options:

A.

Malicious Communications Act (1998)

B.

Anti-Cyber-Stalking law (1999)

C.

Stalking Amendment Act (1999)

D.

Stalking by Electronic Communications Act (2001)

Buy Now
Questions 37

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:

A.

vCard

B.

hCard

C.

HFS+

D.

FAT32

Buy Now
Questions 38

Which of the following are responsibilities of the Service Level Manager?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To define Service Level Agreement

B.

To define the Service Level Agreement structure

C.

To define the Underpinning Contracts (UC) with external providers

D.

To define the Operational Level Agreements with internal providers

Buy Now
Questions 39

Which of the following statements is true about annualized rate of occurrence?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Buy Now
Questions 40

Service Level Agreement (SLA) provides one service for all customers of that service. Which of the following are the contents included by SLAs?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Vocations

B.

Mutual responsibilities

C.

Scope

D.

Service description

Buy Now
Questions 41

Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical computer systems that are necessary to support business continuity. All these tiers provide a simple method to define current service levels and associated risks. Choose and re-order the tiers of disaster recovery plan.

G2700 Question 41

Options:

A.
Buy Now
Questions 42

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to create a document following the Business Model of information security to provide guidelines for information assets. Which of the following are the elements of the Business Model for information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Technology

B.

People

C.

Training

D.

Organization Design and Strategy

E.

Process

Buy Now
Questions 43

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

Options:

A.

Explicit Deny

B.

Implicit Allow

C.

ACL

D.

The principle of least privileges

Buy Now
Questions 44

David works as the Network Administrator for Blue Well Inc. He has been asked to perform risk analysis. He decides to perform it by using CRAMM. The CEO of the company wants to know the stronger points of CRAMM that is going to be used by David. Which of the following points will David tell the CEO of the organization?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It requires protecting a high risk system.

B.

It is effective to meet the objectives of its sub-group.

C.

It does not provide protection against any threat.

D.

It is expensive to implement.

Buy Now
Questions 45

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Annualized Rate of Occurrence

B.

Number of employees in the company

C.

Single Loss Expectancy

D.

Asset Value

Buy Now
Questions 46

You work as an Information Security Officer. You are working on an asset management plan. You need to assign ownership of some assets to an employee. You are making a documentation to explain the responsibilities of an owner of the business asset. Which of the following areas should you include in your documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Revenue tracking

B.

Management

C.

Development

D.

Production

E.

Security

Buy Now
Questions 47

You work as a Security Professional for uCertify Inc. You are working on a Disaster Recovery Plan (DRP). Which of the following are basic functions of DRP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It protects an organization from major computer services failure.

B.

It guarantees the reliability of standby systems through testing and simulation.

C.

It resists the same disaster to come in the future.

D.

It minimizes decision-making required by personnel during a disaster.

Buy Now
Questions 48

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Security Threat

C.

Project schedule

D.

Team members list

E.

Risk analysis

Buy Now
Questions 49

Mark works as a Network Security Administrator for uCertify Inc. He has been assigned the task of installing a MySQL server. Mark wants to monitor only the data that is directed to or originating from the server and he also wants to monitor running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following intrusion detection techniques will Mark use to accomplish the task?

Options:

A.

Network-based IDS

B.

Signature-based IDS

C.

Anomaly-based IDS

D.

Host-based IDS

Buy Now
Questions 50

Which of the following is used for secure financial transactions over the Internet?

Options:

A.

ATM

B.

VPN

C.

SSL

D.

SET

Buy Now
Questions 51

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User manuals

B.

Operating systems

C.

Training metarials

D.

Personal data

Buy Now
Questions 52

Which of the following is a process of identifying and documenting project roles, responsibilities, and reporting relationships?

Options:

A.

Capacity planning

B.

Enterprise resource planning

C.

Business Continuity planning

D.

Human resource planning

Buy Now
Questions 53

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Mail bombing

B.

Cross site scripting attack

C.

Social engineering attack

D.

Password guessing attack

Buy Now
Questions 54

Which of the following are the basics of Business Continuity Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Identification of human resources according to the requirements

B.

Regular checking of business continuity plans

C.

Identification of authentication techniques according to the requirements

D.

Implementation of a risk assessment technique to identify the causes and consequences of failures

Buy Now
Questions 55

You work as a Security Administrator for uCertify Inc. You are working on the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. Which of the following should you include in your plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Resumption of hardware

B.

Resumption of data

C.

Resumption of sales

D.

Resumption of applications

Buy Now
Questions 56

You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?

Options:

A.

An organization should design, implement, and maintain a coherent set of policies to ensure proper marketing of products.

B.

An organization should design, implement, and maintain a coherent set of policies, processes, and systems to manage risks to its information assets.

C.

An organization should apply encryption to its information assets.

D.

An organization should implement and maintain IDS to manage risks to the network.

Buy Now
Questions 57

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk avoidance

B.

Risk mitigation

C.

Risk transference

D.

Risk acceptance

Buy Now
Questions 58

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the slowest method for taking a data backup.

B.

It is the fastest method of backing up data.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Buy Now
Questions 59

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It depends on the physical aspects of the organization.

B.

It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

C.

It depends on the cultural aspects.

D.

It depends on the infrastructure aspects of the organization.

Buy Now
Questions 60

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Viewing an e-mail message

B.

Updating windows files automatically

C.

Visiting a website

D.

Clicking on a deceptive pop-up window

Buy Now
Questions 61

Which of the following security design principles supports comprehensive and simple design and implementation of protection mechanisms, so that an unintended access path does not exist or can be readily identified and eliminated?

Options:

A.

Psychological acceptability

B.

Separation of duties

C.

Economy of mechanism

D.

Least privilege

Buy Now
Questions 62

Which of the following statements is true about single loss expectancy?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Buy Now
Questions 63

Which of the following pillars of Basel II is concerned with maintenance of regulatory capital intended for three major components of risk that a bank faces, which are credit risk, operational risk, and market risk?

Options:

A.

Pillar 4

B.

Pillar 2

C.

Pillar 3

D.

Pillar 1

Buy Now
Questions 64

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

Options:

A.

Honeynet

B.

Production honeypot

C.

Honeyfarm

D.

Research honeypot

Buy Now
Questions 65

Which of the following are the purposes of security awareness, training, and education?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Improve awareness of the need to protect system resources.

B.

Make computer system users aware of their security responsibilities and teaching them correct practices, which helps users change their behavior.

C.

Enhance the skills and knowledge so that the computer users can perform their jobs more securely.

D.

Construct in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems.

Buy Now
Questions 66

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share organization's personal requirements regarding the tool to the third party using a non disclosure agreement (NDA). Which of the following is the purpose of using NDA?

Options:

A.

To ensure that the third-party organization respects the security of information to be share d

B.

To be used as an acknowledgement

C.

To ensure the protection of intellectual copyright of information

D.

To be used as a legal disclaimer

Buy Now
Questions 67

Which of the following are the rights that are given to the person who has processed data?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To require that their data is used for direct marketing

B.

To view the data an organization holds on them, for a small fee, known as 'subject access f ee'

C.

To require that data is not used in any way that may potentially cause damage or distress

D.

To request that incorrect information be corrected

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Aug 19, 2025
Questions: 453

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now G2700 testing engine

PDF (Q&A)

$36.75  $104.99
buy now G2700 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 19 Aug 2025