2013년 8월 23일 금요일

GIAC 자격증 G2700 시험문제와 답

우리ITExamDump의 덤프는 여러분이GIAC G2700인증시험응시에 도움이 되시라고 제공되는 것입니다, 우라ITExamDump에서 제공되는 학습가이드에는GIAC G2700인증시험관연 정보기술로 여러분이 이 분야의 지식 장악에 많은 도움이 될 것이며 또한 아주 정확한GIAC G2700시험문제와 답으로 여러분은 한번에 안전하게 시험을 패스하실 수 있습니다,GIAC G2700인증시험을 아주 높은 점수로 패스할 것을 보장해 드립니다,

ITExamDump 에서 출시한 GIAC인증G2700시험덤프는 100%시험통과율을 보장해드립니다. 엘리트한 IT전문가들이 갖은 노력으로 연구제작한GIAC인증G2700덤프는 PDF버전과 소프트웨어버전 두가지 버전으로 되어있습니다. 구매전 PDF버전무료샘플로ITExamDump제품을 체험해보고 구매할수 있기에 신뢰하셔도 됩니다. 시험불합격시 불합격성적표로 덤프비용을 환불받을수 있기에 아무런 고민을 하지 않으셔도 괜찮습니다.

GIAC인증G2700시험을 패스하기가 어렵다고 하면 합습가이드를 선택하여 간단히 통과하실 수 잇습니다. 우리ITExamDump에서는 무조건 여러분을 위하여 관연 자료덤프 즉 문제와 답을 만들어낼 것입니다. 우리덤프로GIAC인증G2700시험준비를 잘하시면 100%GIAC인증G2700시험을 패스할 수 있습니다. ITExamDump덤프로 여러분은GIAC인증G2700시험을 패스는 물론 여러분의 귀증한 간도 절약하실 수 있습니다.

GIAC G2700인증시험은 현재IT업계에서 아주 인기 있는 시험입니다.많은 IT인사들이 관연 자격증을 취득하려고 노력하고 있습니다.GIAC G2700인증시험에 대한 열기는 식지 않습니다.GIAC G2700자격증은 여러분의 사회생활에 많은 도움이 될 것이며 연봉상승 등 생활보장에 업그레이드 될 것입니다.

ITExamDump 는 여러분의 it전문가 꿈을 이루어드리는 사이트 입다. ITExamDump는 여러분이 우리 자료로 관심 가는 인중시험에 응시하여 안전하게 자격증을 취득할 수 있도록 도와드립니다. 아직도GIAC G2700인증시험으로 고민하시고 계십니까?GIAC G2700인증시험가이드를 사용하실 생각은 없나요? ITExamDump는 여러분에 편리를 드릴 수 잇습니다. ITExamDump의 자료는 시험대비최고의 덤프로 시험패스는 문제없습니다. ITExamDump의 각종인증시험자료는 모두기출문제와 같은 것으로 덤프보고 시험패스는 문제없습니다. ITExamDump의 퍼펙트한 덤프인 M crosoftG2700인증시험자료의 문제와 답만 열심히 공부하면 여러분은 완전 안전히GIAC G2700인증자격증을 취득하실 수 있습니다.

시험 번호/코드: G2700
시험 이름: GIAC (GIAC Certified ISO-2700 Specialist Practice Test)

ITExamDump는 고객님의 IT자격증취득의 작은 소원을 이루어지게 도워드리는 IT인증시험덤프를 제공해드리는 전문적인 사이트입니다. ITExamDump 표 GIAC인증G2700시험덤프가 있으면 인증시험걱정을 버리셔도 됩니다. ITExamDump 표 GIAC인증G2700덤프는 시험출제 예상문제를 정리해둔 실제시험문제에 가장 가까운 시험준비공부자료로서 공을 들이지않고도 시험패스가 가능합니다.

G2700 덤프무료샘플다운로드하기: http://www.itexamdump.com/G2700.html

NO.1 Which of the following is the designing phase of the ISMS?
A. Check
B. Plan
C. Act
D. Do
Answer: B

GIAC시험문제   G2700   G2700 pdf

NO.2 Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the
following formulas best describes the Single Loss Expectancy (SLE)?
A. SLE = Asset Value (AV) * Exposure Factor (EF)
B. SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)
C. SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)
D. SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)
Answer: A

GIAC   G2700자격증   G2700   G2700   G2700 dumps   G2700

NO.3 CORRECT TEXT
Fill in the blank with an appropriate phrase.
_________accord describes the minimum regulatory capital to be allocated by each bank based on its
risk profile of assets.
Answer: Basel ll

GIAC   G2700   G2700인증   G2700

NO.4 Which of the following controls are administrative in nature?
A. Directive controls
B. Recovery controls
C. Preventive controls
D. Detective controls
Answer: A

GIAC자격증   G2700인증   G2700기출문제   G2700   G2700

NO.5 Which of the following are the exceptions of the Data Protection Act?
Each correct answer represents a complete solution. Choose all that apply.
A. Section 36 - Domestic purposes
B. Section 28 - National security
C. Section 55 - Unlawful obtaining of personal data
D. Section 29 - Crime and taxation
Answer: A,B,D

GIAC덤프   G2700덤프   G2700인증   G2700   G2700

NO.6 You work as an Information Security Officer for uCertify Inc. You need to create an asset management
plan differentiating fixed assets from inventory items. How will you differentiate assets from inventory
items?
A. Inventory items are sold.
B. Assets are temporary usually.
C. Inventory items are permanent.
D. Assets cannot be used.
Answer: A

GIAC   G2700 dump   G2700   G2700시험문제   G2700기출문제

NO.7 Which of the following is used for secure financial transactions over the Internet?
A. ATM
B. VPN
C. SSL
D. SET
Answer: D

GIAC   G2700인증   G2700자료   G2700

NO.8 You work as an Information Security Manager for uCertify Inc. You are working on communication and
organization management. You need to create the documentation on change management.
Which of the following are the main objectives of change management?
Each correct answer represents a complete solution. Choose all that apply.
A. Minimal disruption of services
B. Reduction of inventory in accordance with revenue
C. Economic utilization of resources involved in the change
D. Reduction in back-out activities
Answer: A,C,D

GIAC기출문제   G2700 dump   G2700   G2700시험문제   G2700기출문제

NO.9 Which of the following are the uses of cryptography as defined in a policy document?
Each correct answer represents a complete solution. Choose all that apply.
A. Backup
B. Control of keys
C. Applications supporting cryptography
D. Recovery
Answer: A,B,C

GIAC pdf   G2700 dump   G2700덤프   G2700최신덤프   G2700

NO.10 Mark works as a Network Security Administrator for uCertify Inc. An employee of the organization
comes to Mark and tells him that a few months ago, the employee had filled an online bank form due to
some account related work. Today, when again visiting the site, the employee finds that some of his
personal information is still being displayed in the webpage. Which of the following types of cookies
should be disabled by Mark to resolve the issue?
A. Session
B. Temporary
C. Secure
D. Persistent
Answer: D

GIAC자료   G2700   G2700

NO.11 Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some
confidential information is being leaked out by an employee of the company. Rick suspects that someone
is sending the information through email. He checks the emails sent by some employees to other
networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files
that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography
technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.
A. Linguistic steganography
B. Text Semagrams
C. Technical steganography
D. Perceptual masking
Answer: A,B

GIAC덤프   G2700   G2700자료   G2700

NO.12 You work as an Information Security Manager for uCertify Inc. You are working on the
documentation of control A.10.1.1. What is the purpose of control A.10.1.1.?
A. It is concerned with the documentation of the human resource security to make recruitments clear to
the organization.
B. It is concerned with the documentation of the supply chain management.
C. It is concerned with the documentation of operating procedures to ensure the correct and secure use of
information processing facilities.
D. It is concerned with the documentation of the disaster recovery management to ensure proper backup
technologies.
Answer: C

GIAC   G2700자료   G2700

NO.13 Which of the following is a Restrict Anonymous registry value that allows users with explicit
anonymous permissions?
A. 2
B. 3
C. 1
D. 0
Answer: A

GIAC최신덤프   G2700 dumps   G2700 dumps   G2700

NO.14 CORRECT TEXT
Fill in the blank with the appropriate term.
________ is a powerful and low-interaction open source honeypot.
Answer: Honeyd

GIAC   G2700   G2700   G2700 dumps

NO.15 Mark works as an Office Assistant for uCertify Inc. He is responsible for managing office documents.
Today, after opening a word document, Mark noticed that the other opened documents are closed
suddenly. After reopening those documents, Mark found some modifications in the documents. He
contacted his Security Administrator and came to know that there is a virus program installed in the
operating system. Which of the following types of virus has attacked the operating system?
A. Data file
B. Macro
C. Polymorphic
D. Boot sector
Answer: A

GIAC pdf   G2700   G2700인증   G2700

NO.16 Which of the following statements are true about security risks?
Each correct answer represents a complete solution. Choose three.
A. These are considered as an indicator of threats coupled with vulnerability.
B. These can be removed completely by taking proper actions.
C. These can be mitigated by reviewing and taking responsible actions based on possible risks.
D. These can be analyzed and measured by the risk analysis process.
Answer: A,C,D

GIAC   G2700덤프   G2700덤프   G2700   G2700 pdf

NO.17 Which of the following is a fast-emerging global sector that advises individuals and corporations on
how to apply the highest ethical standards to every aspect of their business?
A. Service Capacity Management (SCM)
B. Business Capacity Management (BCM)
C. Resource Capacity Management (RCM)
D. Integrity Management Consulting
Answer: D

GIAC   G2700   G2700

NO.18 You work as the Human Resource Manager for uCertify Inc. You need to recruit some candidates for
the marketing department of the organization. Which of the following should be defined to the new
employees of the organization before they have joined?
Each correct answer represents a complete solution. Choose all that apply.
A. Marketing tips and tricks
B. Organization's network topology
C. Job roles
D. Organization's security policy
Answer: C,D

GIAC dumps   G2700   G2700

NO.19 Which of the following administrative policy controls is usually associated with government
classifications of materials and the clearances of individuals to access those materials?
A. Separation of Duties
B. Due Care
C. Acceptable Use
D. Need to Know
Answer: D

GIAC   G2700   G2700   G2700최신덤프   G2700덤프

NO.20 Which of the following are the basics of Business Continuity Management?
Each correct answer represents a complete solution. Choose all that apply.
A. Implementation of a risk assessment technique to identify the causes and consequences of failures
B. Regular checking of business continuity plans
C. Identification of authentication techniques according to the requirements
D. Identification of human resources according to the requirements
Answer: A,B,D

GIAC자격증   G2700   G2700기출문제   G2700   G2700최신덤프   G2700

NO.21 The disciplined and structured process, that integrates information security and risk management
activities into the System Development Life Cycle, is provided by the risk management framework.
Choose the appropriate RMF steps.
A.
Answer: A

GIAC기출문제   G2700   G2700

NO.22 Mark works as a Network Security Administrator for uCertify Inc. He has been assigned the task of
installing a MySQL server. Mark wants to monitor only the data that is directed to or originating from the
server and he also wants to monitor running processes, file system access and integrity, and user logins
for identifying malicious activities. Which of the following intrusion detection techniques will Mark use to
accomplish the task?
A. Network-based IDS
B. Signature-based IDS
C. Anomaly-based IDS
D. Host-based IDS
Answer: D

GIAC pdf   G2700   G2700자격증   G2700 dump   G2700 pdf

NO.23 Which of the following should be considered while calculating the costs of the outage?
Each correct answer represents a complete solution. Choose all that apply.
A. Sales aspect of the business
B. Cost of low productivity
C. Innovations in electronic funds transfer
D. Cost of lost income from missed sales
Answer: B,D

GIAC   G2700인증   G2700   G2700

NO.24 Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of
the organization. He is configuring some of the advanced features of the Windows firewall so that he can
block the client machine from responding to pings. Which of the following advanced setting types should
Mark change for accomplishing the task?
A. ICMP
B. SNMP
C. UDP
D. SMTP
Answer: A

GIAC   G2700   G2700

NO.25 You work as a Security Administrator for uCertify Inc. You have been assigned the task to verify the
identity of the employees recruited in your organization. Which of the following components of security
deals with an employee's verification in the organization?
A. Network Security
B. Physical security
C. Access security
D. Human resource security
Answer: D

GIAC   G2700시험문제   G2700기출문제

NO.26 Qualitative risk analysis includes judgment, intuition, and experience. Which of the following methods
are used to perform qualitative risk analysis?
Each correct answer represents a complete solution. Choose all that apply.
A. Egress filtering
B. Checklists
C. Delphi technique
D. Brainstorming
Answer: B,C,D

GIAC dumps   G2700   G2700자료   G2700   G2700

NO.27 Which of the following phases of the PDCA model is the monitoring and controlling phase of the
Information Security Management System (ISMS)?
A. Check
B. Plan
C. Do
D. Act
Answer: A

GIAC덤프   G2700   G2700자격증

NO.28 A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following
are the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
A. Risk identification
B. Security Threat
C. Project schedule
D. Team members list
E. Risk analysis
Answer: A,C,D,E

GIAC   G2700최신덤프   G2700최신덤프   G2700

NO.29 You work as a Network Administrator for uCertify Inc. The organization has constructed a cafeteria for
their employees and you are responsible to select the access control method for the cafeteria.
There are a few conditions for giving access to the employees, which are as follows:
1. Top level management can get access any time.
2. Staff members can get access during the specified hours.
3. Guests can get access only in working hours.
Which of the following access control methods is suitable to accomplish the task?
A. Discretionary access control
B. Lattice-based access control
C. Attribute-based access control
D. Rule-based access control
Answer: D

GIAC   G2700자격증   G2700   G2700기출문제

NO.30 You work as an Information Security Manager for uCertify Inc. You need to make the
documentation on change management. What are the advantages of change management?
Each correct answer represents a complete solution. Choose all that apply.
A. Improved productivity of users due to more stable and better IT services
B. Improved IT personnel productivity, since there is a reduced number of urgent changes and a back-out
of erroneous changes
C. Improved adverse impact of changes on the quality of IT services
D. Increased ability to absorb frequent changes without making an unstable IT environment
Answer: A,B,D

GIAC덤프   G2700   G2700   G2700덤프

ITExamDump 에서 제공해드리는 GIAC G2700덤프는 아주 우수한 IT인증덤프자료 사이트입니다. IT업계엘리트한 강사들이 퍼펙트한 GIAC G2700 덤프문제집을 제작하여 디테일한 시험문제와 답으로 여러분이 아주 간단히GIAC G2700시험을 패스할 수 있도록 최선을 다하고 있습니다.

댓글 없음:

댓글 쓰기