Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ECCouncil 312-76 Disaster Recovery Professional Practice Test Exam Practice Test

Page: 1 / 29
Total 290 questions

Disaster Recovery Professional Practice Test Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following terms describes the determination of the effect of changes to the

information system on the security of the information system?

Options:

A.

Validation analysis

B.

Impact analysis

C.

Authentication

D.

Verification

Question 2

Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?

Options:

A.

Trusted computer system

B.

Security perimeter

C.

Abstraction

D.

Trusted path

Question 3

Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FCIP write acceleration

B.

IVR

C.

FCIP compression

D.

SAN extension tuner

Question 4

Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical computer systems that are necessary to support business continuity. All these tiers provide a simple method to define current service levels and associated risks. Choose and re-order the tiers of disaster recovery plan.

Options:

A.

Question 5

Which of the following security procedures is NOT related to the SDLC's disposition?

Options:

A.

Media sanitation

B.

Information preservation

C.

Hardware and software disposal

D.

Security certification

Question 6

Which of the following events occurs in a system when there is a TCB failure and the recovery

procedures cannot return the system to a secure state?

Options:

A.

Fault tolerance

B.

Cold start

C.

Fail-over

D.

Fail-soft

Question 7

Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?

Options:

A.

Risk Management Framework

B.

Risk Management Life Cycle

C.

Capability Maturity Model (CMM)

D.

System Development Life Cycle (SDLC)

Question 8

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Communications Management Plan

B.

Resource Management Plan

C.

Risk Management Plan

D.

Stakeholder management strategy

Question 9

Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

Options:

A.

Configuration identification

B.

Configuration control

C.

Configuration auditing

D.

Documentation control

Question 10

Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?

Options:

A.

RAID-10

B.

RAID-5

C.

RAID-0

D.

RAID-1

Question 11

Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?

Options:

A.

Emergency-management team

B.

Off-site storage team

C.

Software team

D.

Applications team

Question 12

Which of the following system security policies is used to address specific issues of concern to the organization?

Options:

A.

Informative policy

B.

System-specific policy

C.

Program policy

D.

Issue-specific policy

Question 13

Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?

Options:

A.

Parallel test

B.

Checklist test

C.

Simulation test

D.

Full-interruption test

Question 14

Which of the following actions can be performed by using the principle of separation of duties?

Options:

A.

Conducting background investigation

B.

Developing job descriptions

C.

Reducing the opportunity for fraud

D.

Identifying critical positions

Question 15

Which of the following statements about disaster recovery plan documentation are true? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The documentation regarding a disaster recovery plan should be stored in backup tapes.

B.

The disaster recovery plan documentation should be stored offsite only.

C.

The documentation regarding a disaster recovery plan should be stored in floppy disks.

D.

The disaster recovery plan documentation should be stored onsite only.

Question 16

Which of the following DRP tests is plan distributed, and reviewed by the business units for its

thoroughness and effectiveness?

Options:

A.

Functional drill

B.

Parallel test

C.

Walk-through drill

D.

Checklist review

Question 17

Which of the following governance bodies provides management, operational, and technical controls to satisfy the security requirements?

Options:

A.

Chief Information Security Officer

B.

Senior Management

C.

Business Unit Manager

D.

Information Security Steering Committee

Question 18

Which of the following modes of operation supports users with different clearances and data at various classification levels?

Options:

A.

Dedicated

B.

Limited Access

C.

Compartmented

D.

Multilevel mode

Question 19

Which of the following Tier 1 policies will identify who is responsible for what?

Options:

A.

Scope

B.

Responsibilities

C.

Compliance or Consequences

D.

Topic

Question 20

Which of the following tests activates the total disaster recovery plan?

Options:

A.

Structured walk-through test

B.

Full-interruption test

C.

Parallel test

D.

Checklist test

Question 21

Fill in the blank with the appropriate phrase.

__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.

Options:

A.

Privilege escalation

Question 22

BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the following statements are true about BS 7799?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

BS 7799 Part 3 was published in 2005, covering risk analysis and management.

B.

BS 7799 Part 1 was a standard originally published as BS 7799 by the British Standards

Institute (BSI) in 1995.

C.

BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.

D.

BS 7799 Part 1 was adopted by ISO as ISO/IEC 27001 in November 2005.

Question 23

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Recover at the primary operating site

B.

Recover to an alternate site for critical functions

C.

Restore full system after a catastrophic loss

D.

Restore full system at an alternate operating site

Question 24

ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Business continuity management

B.

Information security policy for the organization

C.

Personnel security

D.

System architecture management

E.

System development and maintenance

Question 25

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Question 26

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?

Options:

A.

Occupant Emergency Plan

B.

Disaster Recovery Plan

C.

Cyber Incident Response Plan

D.

Crisis Communication Plan

Question 27

Which of the following strategies is used to minimize the effects of a disruptive event on a

company, and is created to prevent interruptions to normal business activity?

Options:

A.

Business Continuity Plan

B.

Disaster Recovery Plan

C.

Continuity of Operations Plan

D.

Contingency Plan

Question 28

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Guarantee the reliability of standby systems through testing and simulation.

B.

Protect an organization from major computer services failure.

C.

Minimize the risk to the organization from delays in providing services.

D.

Maximize the decision-making required by personnel during a disaster.

Question 29

Which of the following terms describes the determination of the effect of changes to the

information system on the security of the information system?

Options:

A.

Verification

B.

Authentication

C.

Impact analysis

D.

Validation analysis

Question 30

Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?

Options:

A.

Recovery Consistency Objective

B.

Recovery Time Objective

C.

Recovery Point Objective

D.

Recovery Time Actual

Question 31

Which of the following is a category of an automated Incident detection process?

Options:

A.

Catastrophe Theory

B.

Input detection

C.

Control theory

D.

OODA looping

Question 32

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.

Industry averages

B.

Tape restore data

C.

Business impact analysis

D.

Past recovery test results

Question 33

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

Options:

A.

Identification phase

B.

Preparation phase

C.

Differential phase

D.

Eradication phase

Question 34

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

Options:

A.

Non repudiation

B.

Data Protection

C.

Availability

D.

Confidentiality

Question 35

Which of the following statements is related to residual risks?

Options:

A.

It is the probabilistic risk before implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk after implementing all security measures.

Question 36

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Snooping

B.

Utility model

C.

Copyright

D.

Patent

Question 37

Which of the following types of storage requires some direct human action in order to make

access to the storage media physically possible?

Options:

A.

Near-line

B.

Off-line

C.

On-line

D.

Far-line

Question 38

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?

Options:

A.

Utility model

B.

Copyright

C.

Snooping

D.

Patent

Question 39

Fill in the blank with an appropriate phrase.

The ___________ is concerned with rebuilding production processing and determining the criticality of data.

Options:

A.

recovery team

Question 40

Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives?

System and data are validated.

System meets all user requirements.

System meets all control requirements.

Options:

A.

Definition

B.

Evaluation and acceptance

C.

Initiation

D.

Programming and training

Question 41

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Risk analysis

D.

Team members list

E.

Security Threat

Question 42

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?

Options:

A.

Utility model

B.

Patent

C.

Snooping

D.

Copyright

Question 43

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

Options:

A.

MessenPass

B.

Mail Pass View

C.

Asterisk Logger

D.

Access PassView

Page: 1 / 29
Total 290 questions