Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Last Attempt G2700 Questions

Page: 8 / 17
Total 453 questions

GIAC Certified ISO-2700 Specialist Practice Test Questions and Answers

Question 29

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk transfer

B.

Risk mitigation

C.

Risk avoidance

D.

Risk acceptance

Question 30

Mark works as a Security Administrator for uCertify Inc. Somehow Mark comes to know that an employee is keeping illegal software on his workstation. After investigating, Mark finds that this is indeed true. Therefore, Mark decides to file a law suit against the organization, as it is against organization's norms to store illegal information. Now, the organization decides to call the police and suspend Mark from work till further internal inquiries. Which of the following practices has been implemented in this scenario?

Options:

A.

Due diligence

B.

Due process

C.

Privacy

D.

Due care

Question 31

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the slowest method for taking a data backup.

B.

It is the fastest method of backing up data.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Question 32

Which of the following statements are true about Regulation of Investigatory Powers Act 2000?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.

B.

It enables mass surveillance of communications in transit.

C.

It enables certain private bodies to demand that someone hand over keys to protected information.

D.

It allows certain public bodies to monitor people's Internet activities.

Page: 8 / 17
Total 453 questions