Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

312-76 Disaster Recovery Professional Practice Test Questions and Answers

Questions 4

Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FCIP write acceleration

B.

IVR

C.

FCIP compression

D.

SAN extension tuner

Buy Now
Questions 5

Which of the following phases is the first step towards creating a business continuity plan?

Options:

A.

Business Impact Assessment

B.

Plan Approval and Implementation

C.

Business Continuity Plan Development

D.

Scope and Plan Initiation

Buy Now
Questions 6

Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?

Options:

A.

PA09

B.

PA07

C.

PA06

D.

PA10

Buy Now
Questions 7

Which of the following classification schemes is considered to be of a personal nature and is

intended for company use only?

Options:

A.

Sensitive information

B.

Private information

C.

Public information

D.

Confidential information

Buy Now
Questions 8

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

Options:

A.

Differential phase

B.

Identification phase

C.

Preparation phase

D.

Eradication phase

Buy Now
Questions 9

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

Options:

A.

Emergency action team

B.

Emergency-management team

C.

Damage-assessment team

D.

Off-site storage team

Buy Now
Questions 10

Which of the following security procedures is related to the SDLC's implementation?

Options:

A.

Risk assessment

B.

Security accreditation

C.

Media sanitation

D.

Information preservation

Buy Now
Questions 11

Fill in the blank with the appropriate phrase.

__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.

Options:

A.

Privilege escalation

Buy Now
Questions 12

Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is a golden color extinguisher that is filled with about 9.5 gallons (approx. 39 liters) of ordinary tap water.

B.

It uses water and pressure to stifle the heat of fire.

C.

It is also known as a class C fire extinguisher.

D.

It should never be used on grease fires, electrical fires, or class D fires.

Buy Now
Questions 13

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

Options:

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Buy Now
Questions 14

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Buy Now
Questions 15

Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?

Options:

A.

RAID-10

B.

RAID-5

C.

RAID-0

D.

RAID-1

Buy Now
Questions 16

Which of the following events occurs in a system when there is a TCB failure and the recovery

procedures cannot return the system to a secure state?

Options:

A.

Fault tolerance

B.

Cold start

C.

Fail-over

D.

Fail-soft

Buy Now
Questions 17

In risk analysis, which of the following can be identified as a consequence of a disaster?

Options:

A.

Loss of stockholder confidence

B.

Loss of competitive edge

C.

Loss of operating capability

D.

Loss of goodwill

Buy Now
Questions 18

Fill in the blank:

An ___________________ (AS) is a group of networks under a single administration and with single routing policies.

Options:

A.

Autonomous System

Buy Now
Questions 19

Which of the following parts of BS 7799 covers risk analysis and management?

Options:

A.

Part 4

B.

Part 1

C.

Part 2

D.

Part 3

Buy Now
Questions 20

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

Options:

A.

Asterisk logger

B.

FAU

C.

Access Pass View

D.

Galleta

Buy Now
Questions 21

Which of the following security procedures is related to the SDLC's implementation?

Options:

A.

Risk assessment

B.

Media sanitation

C.

Security accreditation

D.

Information preservation

Buy Now
Questions 22

Which of the following individuals incorporates risk assessment in training programs for the

organization's personnel?

Options:

A.

Chief information officer

B.

Information system security officer

C.

Functional manager

D.

Security awareness trainer

Buy Now
Questions 23

Fill in the blank:

A______plan is a plan devised for a specific situation when things could go wrong.

Options:

A.

contingency

Buy Now
Questions 24

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Quantitative analysis

B.

Estimate activity duration

C.

Risk identification

D.

Qualitative analysis

Buy Now
Questions 25

Which of the following individuals incorporates risk assessment in training programs for the

organization's personnel?

Options:

A.

Chief information officer

B.

Information system security officer

C.

Functional manager

D.

Security awareness trainer

Buy Now
Questions 26

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Team members list

C.

Risk analysis

D.

Project schedule

Buy Now
Questions 27

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Organizing a solution to remove an incident

B.

Setting up the initial position after an incident

C.

Building up an incident response kit

D.

Working with QA to validate security of the enterprise

Buy Now
Questions 28

Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?

Options:

A.

The custodian implements the information classification scheme after the initial assignment by the operations manager.

B.

The data owner implements the information classification scheme after the initial assignment by the custodian.

C.

The data custodian implements the information classification scheme after the initial assignment by the data owner.

D.

The custodian makes the initial information classification assignments and the operations manager implements the scheme.

Buy Now
Questions 29

Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?

Options:

A.

Restore the data.

B.

E-mail the data.

C.

Print the data.

D.

Backup the data.

Buy Now
Questions 30

Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives? l System and data are validated. l System meets all user requirements.

l System meets all control requirements.

Options:

A.

Definition

B.

Initiation

C.

Programming and training

D.

Evaluation and acceptance

Buy Now
Questions 31

Which of the following tests activates the total disaster recovery plan?

Options:

A.

Full-interruption test

B.

Structured walk-through test

C.

Checklist test

D.

Parallel test

Buy Now
Questions 32

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

Options:

A.

Technical guides

B.

Executive summary

C.

Checklists

D.

Department-specific plans

Buy Now
Questions 33

Which of the following plans provides procedures for disseminating status reports to personnel and the public?

Options:

A.

Disaster Recovery Plan (DRP)

B.

Crisis Communication Plan (CCP)

C.

Emergency Response Plan (ERP)

D.

Cyber Incident Response Plan (CIRP)

Buy Now
Questions 34

Which of the following documents helps disaster recovery team members in getting the alternate sites up and running?

Options:

A.

Technical guide

B.

Executive summary

C.

Department-specific plan

D.

Checklist

Buy Now
Questions 35

Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?

Options:

A.

PA10

B.

PA06

C.

PA09

D.

PA07

Buy Now
Questions 36

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-0

B.

RAID-1

C.

RAID-5

D.

RAID-10

Buy Now
Questions 37

BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the following statements are true about BS 7799?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

BS 7799 Part 3 was published in 2005, covering risk analysis and management.

B.

BS 7799 Part 1 was a standard originally published as BS 7799 by the British Standards

Institute (BSI) in 1995.

C.

BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.

D.

BS 7799 Part 1 was adopted by ISO as ISO/IEC 27001 in November 2005.

Buy Now
Questions 38

Drag and drop the appropriate team names in front of their respective responsibilities.

Options:

A.

Buy Now
Questions 39

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.

Risk Reassessment

B.

Risk Identification

C.

Risk Analysis

D.

Risk Avoidance

Buy Now
Questions 40

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.

Tape restore data

B.

Past recovery test results

C.

Industry averages

D.

Business impact analysis

Buy Now
Questions 41

Which of the following is the simulation of the disaster recovery plans?

Options:

A.

Walk-through test

B.

Full operational test

C.

Paper test

D.

Preparedness test

Buy Now
Questions 42

Fill in the blank:

An______(AS) is a group of networks under a single administration and with

single routing policies.

Options:

A.

Autonomous System

Buy Now
Questions 43

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

Options:

A.

Host-Based ID system

B.

Statistical Anomaly-Based ID system

C.

Signature-Based ID system

D.

Network-Based ID system

Buy Now
Exam Code: 312-76
Exam Name: Disaster Recovery Professional Practice Test
Last Update: Jun 17, 2024
Questions: 290
312-76 pdf

312-76 PDF

$28  $80
312-76 Engine

312-76 Testing Engine

$33.25  $95
312-76 PDF + Engine

312-76 PDF + Testing Engine

$45.5  $130