Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ECCouncil 312-76 Disaster Recovery Professional Practice Test Exam Practice Test

Demo: 43 questions
Total 290 questions

Disaster Recovery Professional Practice Test Questions and Answers

Question 1

In risk analysis, which of the following can be identified as a consequence of a disaster?

Options:

A.

Loss of stockholder confidence

B.

Loss of competitive edge

C.

Loss of operating capability

D.

Loss of goodwill

Question 2

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

Options:

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Question 3

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Team members list

C.

Risk analysis

D.

Project schedule

Question 4

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Options:

A.

Business impact assessment

B.

Scope and plan initiation

C.

Plan approval and implementation

D.

Business continuity plan development

Question 5

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Broadcast storm

B.

Password sniffing

C.

DoS attack

D.

IP spoofing

Question 6

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is______mm wide, ______mm deep, and______

mm in height.

Options:

A.

100,125,63.5

Question 7

Drag and drop the appropriate team names in front of their respective responsibilities.

Options:

A.

Question 8

Which of the following parts of BS 7799 covers risk analysis and management?

Options:

A.

Part 4

B.

Part 1

C.

Part 2

D.

Part 3

Question 9

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Risk analysis

D.

Team members list

E.

Security Threat

Question 10

Fill the appropriate power supply form factor in the blank space.

_________form factor is similar to LPX form factor in physical dimensions.

Options:

A.

ATX

Question 11

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Snooping

B.

Patent

C.

Utility model

D.

Copyright

Question 12

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:

A.

RTA

B.

RPO

C.

RCO

D.

RTO

Question 13

You are working as a Project Manager in your organization. You are nearing the final stages of project execution, and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Requested changes

C.

Risk audits

D.

Qualitative risk analysis

Question 14

Which of the following best describes the identification, analysis, and ranking of risks?

Options:

A.

Design of experiments

B.

Fast tracking

C.

Fixed-price contract

D.

Plan Risk management

Question 15

Which of the following acts of information security governance affects the financial institutions?

Options:

A.

Sarbanes-Oxley Act of 2002

B.

Health Insurance Privacy and Accountability Act (HIPAA)

C.

California Database Security Breach Information Act

D.

Gramm-Leach-Bliley Act of 1999

Question 16

Which of the following scripts is included as a part of disaster recovery plan to confirm that

everything is working as intended?

Options:

A.

Base-functionality script

B.

Recovery-plan script

C.

SQL Server Index Defrag script

D.

Transact-SQL script

Question 17

Which of the following phases is the first step towards creating a business continuity plan?

Options:

A.

Business Impact Assessment

B.

Plan Approval and Implementation

C.

Business Continuity Plan Development

D.

Scope and Plan Initiation

Question 18

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.

Industry averages

B.

Tape restore data

C.

Business impact analysis

D.

Past recovery test results

Question 19

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

Options:

A.

Non repudiation

B.

Data Protection

C.

Availability

D.

Confidentiality

Question 20

Which of the following stages of the business continuity planning life cycle focuses on the

execution and testing of the individual solution designs developed?

Options:

A.

Testing and acceptance stage

B.

Solution design stage

C.

Analysis stage

D.

Implementation stage

Question 21

Which of the following plans provides procedures for recovering business operations immediately following a disaster?

Options:

A.

Business recovery plan

B.

Continuity of operation plan

C.

Disaster recovery plan

D.

Business continuity plan

Question 22

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Snooping

B.

Patent

C.

Utility model

D.

Copyright

Question 23

In which of the following prototyping, a prototype of a system is built and then evolves into the final system?

Options:

A.

Project prototyping

B.

Evolutionary prototyping

C.

Throw-away prototyping

D.

Incremental prototyping

Question 24

Which of the following contract types is described in the statement below?

"The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs."

Options:

A.

Fixed Price Incentive Fee Contracts (FPIF)

B.

Cost Plus Fixed Fee Contracts (CPFF)

C.

Cost Plus Incentive Fee Contracts (CPIF)

D.

Firm Fixed Price Contracts (FFP)

Question 25

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Non-repudiation

Question 26

Which of the following statements about a certification authority (CA) is true?

Options:

A.

It is a non-profit organization that sets security standards for e-commerce.

B.

It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

C.

It is a trusted third-party organization that issues digital certificates to create digital

signatures and public key pairs.

D.

It issues physical certificates that confirm the identity of entities.

Question 27

Which of the following processes is NOT included in the risk mitigation?

Options:

A.

Risk planning

B.

Risk limitation

C.

Risk identi?cation

D.

Risk assumption

Question 28

Fill in the blank:

An______(AS) is a group of networks under a single administration and with

single routing policies.

Options:

A.

Autonomous System

Question 29

Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?

Options:

A.

Trusted computer system

B.

Security perimeter

C.

Abstraction

D.

Trusted path

Question 30

In which of the following scenarios is database backup transferred to a remote site in a bulk

transfer fashion?

Options:

A.

Remote journaling

B.

Emergency response

C.

Remote mirroring

D.

Electronic vaulting

Question 31

Which of the following sets of incident response practices is recommended by the CERT/CC?

Options:

A.

Prepare, handle, and follow up

B.

Prepare, handle, and notify

C.

Prepare, notify, and follow up

D.

Notify, handle, and follow up

Question 32

Who among the following has the ultimate responsibility for the protection of the organization's information?

Options:

A.

Senior management

B.

Application owner

C.

User

D.

Technology provider

Question 33

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.

Tape restore data

B.

Past recovery test results

C.

Industry averages

D.

Business impact analysis

Question 34

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

The same subnet mask is used everywhere on the network.

B.

They extend the IP addressing scheme.

C.

IGRP is a classless routing protocol.

D.

They support VLSM and discontiguous networks.

Question 35

Which of the following processes is involved in identifying, measuring, and controlling events?

Options:

A.

Incident Management

B.

Response Management

C.

Disaster Recovery

D.

Risk Management

Question 36

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.

Risk Identification

B.

Risk Analysis

C.

Risk Reassessment

D.

Risk Avoidance

Question 37

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Privacy

B.

Availability

C.

Integrity

D.

Confidentiality

Question 38

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?

Options:

A.

Occupant Emergency Plan

B.

Disaster Recovery Plan

C.

Cyber Incident Response Plan

D.

Crisis Communication Plan

Question 39

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

Options:

A.

Asterisk logger

B.

FAU

C.

Access Pass View

D.

Galleta

Question 40

Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Non-repudiation

B.

Confidentiality

C.

Integrity

D.

Authentication

Question 41

Which of the following Tier 1 policies will identify who is responsible for what?

Options:

A.

Scope

B.

Responsibilities

C.

Compliance or Consequences

D.

Topic

Question 42

A Web-based credit card company had collected financial and personal details of Mark before

issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Security law

B.

Privacy law

C.

Trademark law

D.

Copyright law

Question 43

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

Options:

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Demo: 43 questions
Total 290 questions