Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

G2700 Exam Dumps - GIAC Certification Questions and Answers

Question # 4

You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?

Options:

A.

Human resource security

B.

Personal security

C.

Physical security

D.

Network Security

Buy Now
Question # 5

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are considered as an indicator of threats coupled with vulnerability.

B.

These can be removed completely by taking proper actions.

C.

These can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

These can be analyzed and measured by the risk analysis process.

Buy Now
Question # 6

Which of the following terms refers to the time duration during which a system or service is unavailable?

Options:

A.

Uptime

B.

Slowtime

C.

Downtime

D.

Peaktime

Buy Now
Question # 7

David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to submit the report containing annualized loss expectancy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Annualized Rate of Occurrence

B.

Number of employees in the company

C.

Single Loss Expectancy

D.

Asset Value

Buy Now
Question # 8

Which of the following statements are true about Information Security Management?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is not designed to recognize, control, or protect information or any equipment that is used in connection with its processing.

B.

It is designed to recognize, control, and protect information and any equipment that is used in connection with its storage and transmission.

C.

Information Security is a system of policies and procedures.

D.

Information Security Management has the objective to manage information security effectively within all service providers.

Buy Now
Question # 9

You work as a Security Administrator for uCertify Inc. You have been assigned a task to implement information classification levels. You want to put the highly sensitive documents that should only be accessed by few people of the organization. In which of the following information classification levels should you put those documents?

Options:

A.

Department specific

B.

High security levels

C.

Not to be copied

D.

Classified

Buy Now
Question # 10

Which of the following specifies value of each asset?

Options:

A.

Asset importance

B.

Asset protection

C.

Asset responsibility

D.

Asset identification

Buy Now
Question # 11

Which of the following statements is related to residual risks?

Options:

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is the probabilistic risk before implementing all security measures.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk after implementing all security measures.

Buy Now
Question # 12

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk identification

D.

Risk control

Buy Now
Question # 13

Mark works as an Office Assistant for uCertify Inc. He is responsible for managing office documents. Today, after opening a word document, Mark noticed that the other opened documents are closed suddenly. After reopening those documents, Mark found some modifications in the documents. He contacted his Security Administrator and came to know that there is a virus program installed in the operating system. Which of the following types of virus has attacked the operating system?

Options:

A.

Data file

B.

Macro

C.

Polymorphic

D.

Boot sector

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Aug 24, 2025
Questions: 453
G2700 pdf

G2700 PDF

$25.5  $84.99
G2700 Engine

G2700 Testing Engine

$28.5  $94.99
G2700 PDF + Engine

G2700 PDF + Testing Engine

$40.5  $134.99