Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Disaster Recovery Professional Practice Test Question and Answers

Disaster Recovery Professional Practice Test

Last Update Apr 24, 2024
Total Questions : 290

We are offering FREE 312-76 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-76 free exam questions and then go for complete pool of Disaster Recovery Professional Practice Test test questions that will help you more.

312-76 pdf

312-76 PDF

$35  $99.99
312-76 Engine

312-76 Testing Engine

$42  $119.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$56  $159.99
Questions 1

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

Options:

A.  

MessenPass

B.  

Mail Pass View

C.  

Asterisk Logger

D.  

Access PassView

Discussion 0
Questions 2

Fill the appropriate power supply form factor in the blank space.

_________form factor is similar to LPX form factor in physical dimensions.

Options:

A.  

ATX

Discussion 0
Questions 3

Fill the appropriate power supply form factor in the blank space.

_________form factor is similar to LPX form factor in physical dimensions.

Options:

A.  

ATX

Discussion 0
Questions 4

Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?

Options:

A.  

Risk Management Framework

B.  

Risk Management Life Cycle

C.  

Capability Maturity Model (CMM)

D.  

System Development Life Cycle (SDLC)

Discussion 0
Questions 5

Which of the following types of storage requires some direct human action in order to make

access to the storage media physically possible?

Options:

A.  

Near-line

B.  

Off-line

C.  

On-line

D.  

Far-line

Discussion 0
Questions 6

Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?

Options:

A.  

RAID-10

B.  

RAID-5

C.  

RAID-0

D.  

RAID-1

Discussion 0
Questions 7

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.  

Risk Reassessment

B.  

Risk Identification

C.  

Risk Analysis

D.  

Risk Avoidance

Discussion 0
Questions 8

Which of the following functions is performed by change control?

Options:

A.  

It tracks changes to system hardware, software, ?rmware, and

documentation.

B.  

It maintains visibility of changes to the system.

C.  

It tracks and approves changes to system hardware, software,

?rmware, and documentation.

D.  

It ensures that changes to the system are approved.

Discussion 0
Questions 9

Which of the following sites is a non-mainstream alternative to a traditional recovery site?

Options:

A.  

Warm site

B.  

Hot site

C.  

Mobile site

D.  

Cold site

Discussion 0
Questions 10

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.  

Tape restore data

B.  

Past recovery test results

C.  

Industry averages

D.  

Business impact analysis

Discussion 0
Questions 11

Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It is a golden color extinguisher that is filled with about 9.5 gallons (approx. 39 liters) of ordinary tap water.

B.  

It uses water and pressure to stifle the heat of fire.

C.  

It is also known as a class C fire extinguisher.

D.  

It should never be used on grease fires, electrical fires, or class D fires.

Discussion 0
Questions 12

Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?

Options:

A.  

Risk transference

B.  

Risk avoidance

C.  

Risk reduction

D.  

Risk acceptance

Discussion 0
Questions 13

You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?

Options:

A.  

Mitigation

B.  

Sharing

C.  

Exploiting

D.  

Acceptance

Discussion 0
Questions 14

Which of the following components in a TCB acts as the boundary that separates the TCB from the remainder of the system?

Options:

A.  

Abstraction

B.  

Trusted path

C.  

Trusted computer system

D.  

Security perimeter

Discussion 0
Questions 15

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

Options:

A.  

Reset Account Lockout Counter After policy.

B.  

Set Account Lockout Threshold policy.

C.  

Set Account Lockout Duration policy.

D.  

Enforce Password Must Meet Complexity Requirements policy.

Discussion 0
Questions 16

Which of the following systems helps to detect the "abuse of privileges" attack that does not

actually involve exploiting any security vulnerability?

Options:

A.  

Signature-Based ID system

B.  

Network-Based ID system

C.  

Statistical Anomaly-Based ID system

D.  

Host-Based ID system

Discussion 0
Questions 17

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

Options:

A.  

Checklists

B.  

Technical guides

C.  

Executive summary

D.  

Department-specific plans

Discussion 0
Questions 18

Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?

Options:

A.  

Off-site storage team

B.  

Emergency management team

C.  

Damage assessment team

D.  

Emergency action team

Discussion 0
Questions 19

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

Options:

A.  

Technical guides

B.  

Executive summary

C.  

Checklists

D.  

Department-specific plans

Discussion 0
Questions 20

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.  

Containment

B.  

Preparation

C.  

Identification

D.  

Eradication

Discussion 0
Questions 21

Which of the following terms describes the determination of the effect of changes to the

information system on the security of the information system?

Options:

A.  

Validation analysis

B.  

Impact analysis

C.  

Authentication

D.  

Verification

Discussion 0
Questions 22

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.  

Setting up the initial position after an incident

B.  

Organizing a solution to remove an incident

C.  

Working with QA to validate security of the enterprise

D.  

Building up an incident response kit

Discussion 0
Questions 23

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.  

RAID-0

B.  

RAID-1

C.  

RAID-5

D.  

RAID-10

Discussion 0
Questions 24

Which of the following statements about disaster recovery plan documentation are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

The documentation regarding a disaster recovery plan should be stored in backup tapes.

B.  

The documentation regarding a disaster recovery plan should be stored in floppy disks.

C.  

The disaster recovery plan documentation should be stored onsite only.

D.  

The disaster recovery plan documentation should be stored offsite only.

Discussion 0
Questions 25

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Risk identification

B.  

Team members list

C.  

Risk analysis

D.  

Project schedule

Discussion 0
Questions 26

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Options:

A.  

Disaster Recovery Plan

B.  

Business Continuity Plan

C.  

Contingency Plan

D.  

Continuity of Operations Plan

Discussion 0
Questions 27

Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?

Options:

A.  

Recovery Consistency Objective

B.  

Recovery Time Objective

C.  

Recovery Point Objective

D.  

Recovery Time Actual

Discussion 0
Questions 28

Which of the following workforces works to handle the incidents in an enterprise?

Options:

A.  

Z force

B.  

IEEE Software Development Team

C.  

Computer Emergency Response Team

D.  

Computer Forensics Team

Discussion 0
Questions 29

Which of the following statements is related to residual risks?

Options:

A.  

It is the probabilistic risk before implementing all security measures.

B.  

It can be considered as an indicator of threats coupled with vulnerability.

C.  

It is a weakness or lack of safeguard that can be exploited by a threat.

D.  

It is the probabilistic risk after implementing all security measures.

Discussion 0
Questions 30

Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?

Options:

A.  

Restore the data.

B.  

E-mail the data.

C.  

Print the data.

D.  

Backup the data.

Discussion 0
Questions 31

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Options:

A.  

Contingency plan

B.  

Disaster recovery plan

C.  

Crisis communication plan

D.  

Business continuity plan

Discussion 0
Questions 32

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

Options:

A.  

Maximize the decision-making required by personnel during a disaster.

B.  

Guarantee the reliability of standby systems through testing and simulation.

C.  

Protect an organization from major computer services failure.

D.  

Minimize the risk to the organization from delays in providing services.

Discussion 0
Questions 33

Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?

Options:

A.  

Separation of duties

B.  

Need to Know

C.  

Segregation of duties

D.  

Due care

Discussion 0
Questions 34

Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?

Options:

A.  

Risk Mitigation

B.  

Risk Transference

C.  

Risk Avoidance

D.  

Risk Acceptance

Discussion 0
Questions 35

Which of the following processes is required for effective business continuity and disaster-recovery planning?

Options:

A.  

Walk-through testing

B.  

Paper testing

C.  

Business impact assessment (BIA)

D.  

Preparedness testing

Discussion 0
Questions 36

Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?

Options:

A.  

Emergency action team

B.  

Off-site storage team

C.  

Emergency management team

D.  

Damage assessment team

Discussion 0
Questions 37

Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?

Options:

A.  

SIIT

B.  

NAT

C.  

NAT-PT

D.  

NAPT-PT

Discussion 0
Questions 38

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.  

Risk Identification

B.  

Risk Analysis

C.  

Risk Reassessment

D.  

Risk Avoidance

Discussion 0
Questions 39

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Options:

A.  

Password guessing attack

B.  

Dictionary attack

C.  

Man-in-the-middle attack

D.  

Denial-of-service attack

Discussion 0
Questions 40

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.

Options:

A.  

100

Discussion 0
Questions 41

In risk analysis, which of the following can be identified as a consequence of a disaster?

Options:

A.  

Loss of stockholder confidence

B.  

Loss of competitive edge

C.  

Loss of operating capability

D.  

Loss of goodwill

Discussion 0
Questions 42

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

Options:

A.  

Emergency management team

B.  

Damage assessment team

C.  

Off-site storage team

D.  

Emergency action team

Discussion 0
Questions 43

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Broadcast storm

B.  

Password sniffing

C.  

DoS attack

D.  

IP spoofing

Discussion 0