Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

G2700 Exam Dumps - GIAC Certification Questions and Answers

Question # 64

Which of the following are the activities of Incident Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Incident closure

B.

Incident detection and recording

C.

Classification and initial support

D.

Investigation and diagnosis

Buy Now
Question # 65

What are the basic steps involved in Continuity Management?

1. Prioritizing the businesses to be recovered by conducting a Business Impact Analysis (BIA).

2. Performing a Risk Assessment (aka Risk Analysis) for each of the IT Services to identify the assets, threats, vulnerabilities, and countermeasures for each service.

3. Evaluating the options for recovery.

4. Producing the Contingency Plan.

5. Testing, reviewing, and revising the plan on a regular basis.

Each correct answer represents a complete solution. Choose two.

Options:

A.

1, 3, and 5 only

B.

1, 2, 3, 4, and 5

C.

3, 4, and 5 only

D.

1, 2, and 5 only

E.

2, 3, and 4

Buy Now
Question # 66

Which of the following represents the software component of IT asset management?

Options:

A.

RSG

B.

SAM

C.

NAS

D.

SAN

Buy Now
Question # 67

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to make a document on the classification of information assets. Which of the following controls of the ISO standard provides guidelines on the classification of information?

Options:

A.

Control A.7.2

B.

Control A.7.1.2

C.

Control A.7.2.1

D.

Control A.7.1.3

Buy Now
Question # 68

Fill in the blank with the appropriate term.

______is the process of managing user authorizations based on the ITU-T Recommendation X.509.

Options:

Buy Now
Question # 69

You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. You need to audit the network of the company. You need to plan the audit process to minimize the audit risk.

What steps will you take to minimize the possibility of audit risk?

Options:

A.

Buy Now
Question # 70

You work as a Network Security Administrator for uCertify Inc. You feel that someone has accessed your computer and used your e-mail account. To check whether there is any virus installed into your computer, you scan your computer but do not find any illegal software. Which of the following types of security attacks generally runs behind the scenes on your computer?

Options:

A.

Zero-day

B.

Rootkit

C.

Hybrid

D.

Replay

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Aug 24, 2025
Questions: 453
G2700 pdf

G2700 PDF

$25.5  $84.99
G2700 Engine

G2700 Testing Engine

$28.5  $94.99
G2700 PDF + Engine

G2700 PDF + Testing Engine

$40.5  $134.99