Disaster Recovery Professional Practice Test
Last Update Feb 14, 2025
Total Questions : 290
We are offering FREE 312-76 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-76 free exam questions and then go for complete pool of Disaster Recovery Professional Practice Test test questions that will help you more.
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?
Fill the appropriate power supply form factor in the blank space.
_________form factor is similar to LPX form factor in physical dimensions.
Fill the appropriate power supply form factor in the blank space.
_________form factor is similar to LPX form factor in physical dimensions.
Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?
Which of the following types of storage requires some direct human action in order to make
access to the storage media physically possible?
Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?
Which of the following sites is a non-mainstream alternative to a traditional recovery site?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?
Which of the following components in a TCB acts as the boundary that separates the TCB from the remainder of the system?
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?
Which of the following systems helps to detect the "abuse of privileges" attack that does not
actually involve exploiting any security vulnerability?
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
Which of the following terms describes the determination of the effect of changes to the
information system on the security of the information system?
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?
Which of the following workforces works to handle the incidents in an enterprise?
Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?
Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?
Which of the following processes is required for effective business continuity and disaster-recovery planning?
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?
Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
Fill the measurement of SFX form factor style power supply in the blank space.
The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.
In risk analysis, which of the following can be identified as a consequence of a disaster?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.