New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC Certification G2700 Updated Exam

Page: 6 / 17
Total 453 questions

GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Question 21

By gaining full control of a router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Launching a Max Age attack

B.

Route table poisoning

C.

Launching a Sequence++ attack

D.

Launching a social engineering attack

Question 22

Which of the following indicates that the project team has decided not to change the project management plan to deal with a risk?

Options:

A.

Risk avoidance

B.

Risk mitigation

C.

Risk transference

D.

Risk acceptance

Question 23

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Packet sniffing

B.

Spoofing

C.

Cryptanalysis

D.

Steganography

Question 24

Which of the following statements is true about pattern matching IDS?

Options:

A.

IDS can match empty list only.

B.

IDS can only be effective unless the company's security policies are not defined and followed in practice.

C.

IDS can trigger only on signatures that are stored in the database of the IDS.

D.

IDS can detect only when an attacker is passively sniffing data.

Page: 6 / 17
Total 453 questions