Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

312-76 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

312-76 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Disaster Recovery Professional Practice Test
  • Last Update: May 4, 2024
  • Questions and Answers: 290
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

312-76 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

312-76 Practice Exam Questions with Answers Disaster Recovery Professional Practice Test Certification

Question # 6

Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?

A.

Detective measures

B.

Corrective measures

C.

Supportive measures

D.

Preventive measures

Full Access
Question # 7

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

A.

Emergency action team

B.

Emergency-management team

C.

Damage-assessment team

D.

Off-site storage team

Full Access
Question # 8

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

A.

Quantitative risk analysis

B.

Risk audits

C.

Requested changes

D.

Qualitative risk analysis

Full Access
Question # 9

Fill the appropriate power supply form factor in the blank space.

_________form factor is similar to LPX form factor in physical dimensions.

A.

ATX

Full Access
Question # 10

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

A.

Simulation test

B.

Parallel test

C.

Full-interruption test

D.

Structured walk-through test

Full Access
Question # 11

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

A.

Asterisk logger

B.

FAU

C.

Access Pass View

D.

Galleta

Full Access
Question # 12

Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?

A.

Emergency-management team

B.

Off-site storage team

C.

Software team

D.

Applications team

Full Access
Question # 13

In which of the following DRP tests does a business unit management meet to review the plan?

A.

Simulation test

B.

Parallel test

C.

Structured walk-through test

D.

Full-interruption test

Full Access
Question # 14

Which of the following system security policies is used to address specific issues of concern to the organization?

A.

Informative policy

B.

System-specific policy

C.

Program policy

D.

Issue-specific policy

Full Access
Question # 15

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

A.

Password guessing attack

B.

Dictionary attack

C.

Man-in-the-middle attack

D.

Denial-of-service attack

Full Access
Question # 16

Which of the following processes measures the maturity level of the security program?

A.

Risk analysis

B.

GAP analysis

C.

Risk assessment

D.

Risk mitigation

Full Access
Question # 17

Which of the following classification schemes is considered to be of a personal nature and is

intended for company use only?

A.

Sensitive information

B.

Private information

C.

Public information

D.

Confidential information

Full Access
Question # 18

Which of the following DRP tests is plan distributed, and reviewed by the business units for its

thoroughness and effectiveness?

A.

Functional drill

B.

Parallel test

C.

Walk-through drill

D.

Checklist review

Full Access
Question # 19

Which of the following options is an intellectual property right to protect inventions?

A.

Snooping

B.

Patent

C.

Copyright

D.

Utility model

Full Access
Question # 20

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Full Access
Question # 21

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Snooping

B.

Utility model

C.

Copyright

D.

Patent

Full Access
Question # 22

In risk analysis, which of the following can be identified as a consequence of a disaster?

A.

Loss of stockholder confidence

B.

Loss of competitive edge

C.

Loss of operating capability

D.

Loss of goodwill

Full Access
Question # 23

Drag and drop the appropriate team names in front of their respective responsibilities.

312-76 question answer

A.

Full Access
Question # 24

Which of the following security procedures is NOT related to the SDLC's disposition?

A.

Media sanitation

B.

Information preservation

C.

Hardware and software disposal

D.

Security certification

Full Access
Question # 25

Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

A.

Configuration identification

B.

Documentation control

C.

Configuration auditing

D.

Configuration control

Full Access
Question # 26

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

A.

Cyber Incident Response Plan

B.

Crisis Communication Plan

C.

Occupant Emergency Plan

D.

Disaster Recovery Plan

Full Access
Question # 27

Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?

A.

Business Impact Assessment

B.

Business Continuity Plan Development

C.

Plan Approval and Implementation

D.

Scope and Plan Initiation

Full Access
Question # 28

You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?

A.

Transference

B.

Mitigation

C.

Avoidance

D.

Acceptance

Full Access
Question # 29

Which of the following backup sites is a replica of the original site of an organization with full computer systems as well as near-complete backups of user data?

A.

Hot backup site

B.

Warm backup site

C.

Mobile backup site

D.

Cold backup site

Full Access
Question # 30

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

A.

Broadcast storm

B.

Password sniffing

C.

DoS attack

D.

IP spoofing

Full Access
Question # 31

Which of the following Tier 1 policies will identify who is responsible for what?

A.

Scope

B.

Responsibilities

C.

Compliance or Consequences

D.

Topic

Full Access
Question # 32

You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?

A.

Configuration auditing

B.

Configuration identification

C.

Configuration control

D.

Configuration status accounting

Full Access
Question # 33

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.

Ensure that each member of the disaster recovery team is aware of their responsibility.

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that the plan works properly

D.

Ensure that all client computers in the organization are shut down.

Full Access
Question # 34

ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?

Each correct answer represents a complete solution. Choose all that apply.

A.

Business continuity management

B.

Information security policy for the organization

C.

Personnel security

D.

System architecture management

E.

System development and maintenance

Full Access
Question # 35

Which of the following statements about disaster recovery plan documentation are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

The documentation regarding a disaster recovery plan should be stored in backup tapes.

B.

The documentation regarding a disaster recovery plan should be stored in floppy disks.

C.

The disaster recovery plan documentation should be stored onsite only.

D.

The disaster recovery plan documentation should be stored offsite only.

Full Access
Question # 36

Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?

A.

CPM

B.

Gantt

C.

PERT

D.

FP

Full Access
Question # 37

Which of the following BCP teams handles financial arrangement, public relations, and media inquiries at the time of disaster recovery?

A.

Applications team

B.

Software team

C.

Emergency management team

D.

Off-site storage team

Full Access
Question # 38

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

A.

Security law

B.

Privacy law

C.

Trademark law

D.

Copyright law

Full Access
Question # 39

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

A.

Configuration auditing

B.

Configuration identification

C.

Configuration status accounting

D.

Configuration control

Full Access
Question # 40

Which of the following parts of BS 7799 covers risk analysis and management?

A.

Part 2

B.

Part 4

C.

Part 1

D.

Part 3

Full Access
Question # 41

In which of the following managing styles does the manager supervise subordinates very closely and give detail directions?

A.

The coaching style

B.

The supporting style

C.

The delegating style

D.

The directing style

Full Access
Question # 42

In risk analysis, which of the following can be identified as a consequence of a disaster?

A.

Loss of stockholder confidence

B.

Loss of competitive edge

C.

Loss of operating capability

D.

Loss of goodwill

Full Access
Question # 43

Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?

A.

PA10

B.

PA06

C.

PA09

D.

PA07

Full Access