Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

G2700 Exam Dumps - GIAC Certification Questions and Answers

Question # 24

Who of the following receive reports after the Check phase of the PDCA model is completed?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security Officer

B.

Management

C.

CEO

D.

Chief Information Security Officer

Buy Now
Question # 25

You work as a Security Administrator for uCertify Inc. You have been assigned a task to provide a solution that has a striped set with distributed parity or interleave parity. Which of the following will help you to meet the organizational requirements?

Options:

A.

RAID 3/4

B.

RAID 0

C.

RAID 10

D.

RAID 5

Buy Now
Question # 26

Which of the following types of viruses is placed into the first sector of the hard drive?

Options:

A.

Multipartite

B.

Master boot record

C.

File

D.

Boot sector

Buy Now
Question # 27

What does CRAMM stand for?

Options:

A.

Continuous Risk Analysis and Management Method

B.

CCTA Risk Analysis and Management Method

C.

Continuous Risk Analyzer and Manager Methodology

D.

CCTA Risk Analyzer and Manager Methodology

Buy Now
Question # 28

Which of the following are computer clusters that are implemented primarily for the purpose of providing high availability of services which the cluster provides?

Options:

A.

Load balancing clusters

B.

Globular clusters

C.

Tightly-coupled compute clusters

D.

High-availability clusters

Buy Now
Question # 29

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to create a document following the Business Model of information security to provide guidelines for information assets. Which of the following are the elements of the Business Model for information security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Process

B.

Technology

C.

People

D.

Training

E.

Organization Design and Strategy

Buy Now
Question # 30

Which of the following is used to govern the disclosure of financial and accounting information?

Options:

A.

Gramm-Leach-Bliley Act

B.

Privacy act of 1974

C.

Sarbanes-Oxley

D.

Health Insurance Portability and Accountability Act

Buy Now
Question # 31

Sam works as a Network Administrator for Blue Well Inc. The company decides to opt for a strategy of a mix of measures to minimize risks. A stand-by arrangement is organized for the company. To which of the following categories of measures does a stand-by arrangement belong?

Options:

A.

Corrective measures

B.

Detective measures

C.

Repressive measures

D.

Preventive measures

Buy Now
Question # 32

What is the name given to the system that guarantees the coherence of information security in the organization?

Options:

A.

Information Security Management System

B.

Rootkit

C.

Stemkit

D.

Security regulations for special information for the government

Buy Now
Question # 33

You work as a Security Administrator for uCertify Inc. You need to install a honeypot inside network firewalls to monitor and track hackers. What should you install on the system before deploying the honeypot?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Install the IAS server on the system to verify Internet related activities.

B.

Install the RADIUS server to check the authentication of the invader.

C.

Install the application that is designed to record the activities of the invader.

D.

Install the operating system without patches installed and use typical defaults and options.

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Aug 24, 2025
Questions: 453
G2700 pdf

G2700 PDF

$25.5  $84.99
G2700 Engine

G2700 Testing Engine

$28.5  $94.99
G2700 PDF + Engine

G2700 PDF + Testing Engine

$40.5  $134.99