Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-76 Exam Dumps - Disaster Recovery Professional Practice Test

Question # 4

Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?

A.

Restore the data.

B.

E-mail the data.

C.

Print the data.

D.

Backup the data.

Full Access
Question # 5

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Full Access
Question # 6

Which of the following actions can be performed by using the principle of separation of duties?

A.

Developing job descriptions

B.

Identifying critical positions

C.

Conducting background investigation

D.

Reducing the opportunity for fraud

Full Access
Question # 7

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

A.

Disaster Recovery Plan

B.

Continuity Of Operations Plan

C.

Business Continuity Plan

D.

Contingency Plan

Full Access
Question # 8

Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?

A.

Risk transference

B.

Risk avoidance

C.

Risk reduction

D.

Risk acceptance

Full Access
Question # 9

Which of the following workforces works to handle the incidents in an enterprise?

A.

Z force

B.

IEEE Software Development Team

C.

Computer Emergency Response Team

D.

Computer Forensics Team

Full Access
Question # 10

You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?

A.

Transference

B.

Mitigation

C.

Avoidance

D.

Acceptance

Full Access
Question # 11

In which of the following DRP tests does a business unit management meet to review the plan?

A.

Simulation test

B.

Parallel test

C.

Structured walk-through test

D.

Full-interruption test

Full Access
Question # 12

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

A.

Tape restore data

B.

Past recovery test results

C.

Industry averages

D.

Business impact analysis

Full Access
Question # 13

Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?

A.

Trusted computer system

B.

Security perimeter

C.

Abstraction

D.

Trusted path

Full Access
Question # 14

Which of the following processes is used by organizations to set the risk tolerance, identify the potential risks, and prioritize the tolerance for risk?

A.

Risk communication

B.

Risk identification

C.

Risk management

D.

Risk analysis

Full Access
Question # 15

In which of the following DRP tests does a business unit management meet to review the plan?

A.

Simulation test

B.

Parallel test

C.

Structured walk-through test

D.

Full-interruption test

Full Access
Question # 16

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

A.

Reset Account Lockout Counter After policy.

B.

Enforce Password Must Meet Complexity Requirements policy.

C.

Set Account Lockout Duration policy.

D.

Set Account Lockout Threshold policy.

Full Access
Question # 17

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Full Access
Question # 18

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

A.

Maximize the decision-making required by personnel during a disaster.

B.

Guarantee the reliability of standby systems through testing and simulation.

C.

Protect an organization from major computer services failure.

D.

Minimize the risk to the organization from delays in providing services.

Full Access
Question # 19

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

A.

Legal value

B.

Recourse record

C.

Fiscal value

D.

Vital record

Full Access
Question # 20

Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?

A.

Corrective measures

B.

Detective measures

C.

Preventive measures

D.

Supportive measures

Full Access
Question # 21

Fill in the blank with the appropriate number:

RAID-________ is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 22

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

A.

Host-Based ID system

B.

Signature-Based ID system

C.

Statistical Anomaly-Based ID system

D.

Network-Based ID system

Full Access
Question # 23

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute Force attack

C.

Rule based attack

D.

Hybrid attack

Full Access
Question # 24

Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?

A.

Off-site storage team

B.

Emergency management team

C.

Damage assessment team

D.

Emergency action team

Full Access
Question # 25

You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?

A.

Configuration auditing

B.

Configuration identification

C.

Configuration control

D.

Configuration status accounting

Full Access
Question # 26

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

A.

AES

B.

DES

C.

IDEA

D.

PGP

Full Access
Question # 27

Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?

A.

Disaster Recovery Plan

B.

Crisis Communication Plan

C.

Cyber Incident Response Plan

D.

Occupant Emergency Plan

Full Access
Question # 28

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

A.

Host-Based ID system

B.

Signature-Based ID system

C.

Statistical Anomaly-Based ID system

D.

Network-Based ID system

Full Access
Question # 29

Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?

A.

Parallel test

B.

Checklist test

C.

Simulation test

D.

Full-interruption test

Full Access
Question # 30

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Structured walk-through test

Full Access
Question # 31

Which of the following Tier 1 policies will identify who is responsible for what?

A.

Responsibilities

B.

Compliance or Consequences

C.

Scope

D.

Topic

Full Access
Question # 32

Which of the following defines the communication link between a Web server and Web applications?

A.

IETF

B.

Firewall

C.

PGP

D.

CGI

Full Access
Question # 33

Which of the following phases is the first step towards creating a business continuity plan?

A.

Business Impact Assessment

B.

Plan Approval and Implementation

C.

Business Continuity Plan Development

D.

Scope and Plan Initiation

Full Access
Question # 34

Which of the following events occurs in a system when there is a TCB failure and the recovery

procedures cannot return the system to a secure state?

A.

Fault tolerance

B.

Cold start

C.

Fail-over

D.

Fail-soft

Full Access
Question # 35

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Full Access
Question # 36

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

A.

RTA

B.

RPO

C.

RCO

D.

RTO

Full Access
Question # 37

Which of the following actions can be performed by using the principle of separation of duties?

A.

Developing job descriptions

B.

Identifying critical positions

C.

Conducting background investigation

D.

Reducing the opportunity for fraud

Full Access
Question # 38

Which of the following tests activates the total disaster recovery plan?

A.

Full-interruption test

B.

Structured walk-through test

C.

Checklist test

D.

Parallel test

Full Access
Question # 39

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Risk identification

B.

Team members list

C.

Risk analysis

D.

Project schedule

Full Access
Question # 40

Which of the following security procedures is related to the SDLC's implementation?

A.

Risk assessment

B.

Security accreditation

C.

Media sanitation

D.

Information preservation

Full Access
Question # 41

Which of the following processes acts as a control measure that provides some amount of

protection to the assets?

A.

Risk

B.

Countermeasure

C.

Vulnerability

D.

Safeguard

Full Access
Question # 42

In which of the following prototyping, a version of the system is built to check the requirements and is then discarded?

A.

Evolutionary prototyping

B.

Incremental prototyping

C.

Project prototyping

D.

Throw-away prototyping

Full Access
Question # 43

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

A.

The same subnet mask is used everywhere on the network.

B.

They extend the IP addressing scheme.

C.

IGRP is a classless routing protocol.

D.

They support VLSM and discontiguous networks.

Full Access