New Year Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

312-76 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

312-76 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Disaster Recovery Professional Practice Test
  • Last Update: Jan 13, 2025
  • Questions and Answers: 290
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

312-76 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

312-76 Practice Exam Questions with Answers Disaster Recovery Professional Practice Test Certification

Question # 6

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?

A.

At every status meeting of the project team, project risk management is an agenda item.

B.

Project risk management happens at every milestone.

C.

Project risk management has been concluded with the project planning.

D.

Project risk management is scheduled for every month in the 18-month project.

Full Access
Question # 7

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

A.

Qualitative analysis

B.

Estimate activity duration

C.

Quantitative analysis

D.

Risk identification

Full Access
Question # 8

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

A.

MessenPass

B.

Mail Pass View

C.

Asterisk Logger

D.

Access PassView

Full Access
Question # 9

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Non-repudiation

Full Access
Question # 10

Which of the following defines the communication link between a Web server and Web applications?

A.

IETF

B.

Firewall

C.

PGP

D.

CGI

Full Access
Question # 11

Which of the following contract types is described in the statement below?

"The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs."

A.

Fixed Price Incentive Fee Contracts (FPIF)

B.

Cost Plus Fixed Fee Contracts (CPFF)

C.

Cost Plus Incentive Fee Contracts (CPIF)

D.

Firm Fixed Price Contracts (FFP)

Full Access
Question # 12

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is______mm wide, ______mm deep, and______

mm in height.

A.

100,125,63.5

Full Access
Question # 13

Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?

A.

CERT

B.

CSIRT

C.

FedCIRC

D.

FIRST

Full Access
Question # 14

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

A.

Legal value

B.

Recourse record

C.

Fiscal value

D.

Vital record

Full Access
Question # 15

Which of the following tasks is prioritized the most by the information security strategy?

A.

Industry best practices

B.

Technology plans and deliverables

C.

Business goals and objectives

D.

Security metrics

Full Access
Question # 16

Which of the following statements is related to residual risks?

A.

It is the probabilistic risk before implementing all security measures.

B.

It can be considered as an indicator of threats coupled with vulnerability.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk after implementing all security measures.

Full Access
Question # 17

Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?

A.

SIIT

B.

NAT

C.

NAT-PT

D.

NAPT-PT

Full Access
Question # 18

Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?

A.

Behavior-based ID system

B.

Network-based ID system

C.

Signature-Based ID system

D.

Host-based ID system

Full Access
Question # 19

Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?

A.

Trusted computer system

B.

Security perimeter

C.

Abstraction

D.

Trusted path

Full Access
Question # 20

Fill the appropriate power supply form factor in the blank space.

_________form factor is similar to LPX form factor in physical dimensions.

A.

ATX

Full Access
Question # 21

In which of the following DRP tests does a business unit management meet to review the plan?

A.

Simulation test

B.

Parallel test

C.

Structured walk-through test

D.

Full-interruption test

Full Access
Question # 22

Fill in the blank with the appropriate number:

RAID-______is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 23

Which of the following SSE-CMM security engineering Process Areas (PA) provides the security input?

A.

PA06

B.

PA09

C.

PA07

D.

PA08

Full Access
Question # 24

Which of the following individuals incorporates risk assessment in training programs for the

organization's personnel?

A.

Chief information officer

B.

Information system security officer

C.

Functional manager

D.

Security awareness trainer

Full Access
Question # 25

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Snooping

B.

Patent

C.

Utility model

D.

Copyright

Full Access
Question # 26

Which of the following Tier 1 policies will identify who is responsible for what?

A.

Scope

B.

Responsibilities

C.

Compliance or Consequences

D.

Topic

Full Access
Question # 27

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A.

Disaster Recovery Plan

B.

Business Continuity Plan

C.

Contingency Plan

D.

Continuity of Operations Plan

Full Access
Question # 28

Which of the following processes helps the organization to identify appropriate controls for

reducing or eliminating risk during the risk mitigation process?

A.

Risk Assessment

B.

Risk Acceptance

C.

Risk Transference

D.

Risk Identification

Full Access
Question # 29

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Full Access
Question # 30

In which of the following managing styles does the manager supervise subordinates very closely and give detail directions?

A.

The coaching style

B.

The supporting style

C.

The delegating style

D.

The directing style

Full Access
Question # 31

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

A.

Tape restore data

B.

Past recovery test results

C.

Industry averages

D.

Business impact analysis

Full Access
Question # 32

Which of the following types of agreement can be a legally binding formal or informal "contract"?

A.

Non-disclosure agreement

B.

Consulting agreement

C.

Cooperative agreement

D.

Service level agreement

Full Access
Question # 33

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Full Access
Question # 34

Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?

A.

Business Continuity Strategy

B.

Index of Disaster-Relevant Information

C.

Disaster Invocation Guideline

D.

Availability/ ITSCM/ Security Testing Schedule

Full Access
Question # 35

Which of the following types of control gives an instance of the audit log?

A.

Preventive

B.

Detection

C.

Containment

D.

Recovery

Full Access
Question # 36

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

A.

Security law

B.

Privacy law

C.

Trademark law

D.

Copyright law

Full Access
Question # 37

Which of the following types of controls focuses on stopping a security breach from taking place in the ?rst place?

A.

Detection

B.

Containment

C.

Preventive

D.

Recovery

Full Access
Question # 38

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Risk identification

B.

Team members list

C.

Risk analysis

D.

Project schedule

Full Access
Question # 39

Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?

Each correct answer represents a complete solution. Choose all that apply.

A.

FCIP write acceleration

B.

IVR

C.

FCIP compression

D.

SAN extension tuner

Full Access
Question # 40

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

A.

Reset Account Lockout Counter After policy.

B.

Set Account Lockout Threshold policy.

C.

Set Account Lockout Duration policy.

D.

Enforce Password Must Meet Complexity Requirements policy.

Full Access
Question # 41

Who among the following has the ultimate responsibility for the protection of the organization's information?

A.

Senior management

B.

Application owner

C.

User

D.

Technology provider

Full Access
Question # 42

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

A.

Eradication

B.

Identification

C.

Containment

D.

Recovery

Full Access
Question # 43

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

A.

Availability

B.

Non repudiation

C.

Confidentiality

D.

Data Protection

Full Access
Question # 44

Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives? l System and data are validated. l System meets all user requirements.

l System meets all control requirements.

A.

Definition

B.

Initiation

C.

Programming and training

D.

Evaluation and acceptance

Full Access
Question # 45

Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?

A.

Risk Mitigation

B.

Risk Transference

C.

Risk Avoidance

D.

Risk Acceptance

Full Access
Question # 46

Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

A.

Non-repudiation

B.

Confidentiality

C.

Integrity

D.

Authentication

Full Access
Question # 47

In risk analysis, which of the following can be identified as a consequence of a disaster?

A.

Loss of stockholder confidence

B.

Loss of competitive edge

C.

Loss of operating capability

D.

Loss of goodwill

Full Access
Question # 48

In which of the following managing styles does the manager supervise subordinates very closely and give detail directions?

A.

The coaching style

B.

The supporting style

C.

The delegating style

D.

The directing style

Full Access
Question # 49

Organizations must assess the safety of their workplaces and consider the ability of a business to continue despite risk impact. When assessing business continuity risks, the HR Professional must consider several different types of disasters, their probability, and impact on an organization. What category of disaster is best described as acts of terrorism, major thefts, sabotage, or labor disputes?

A.

Organized or deliberate disruptions

B.

System failures

C.

Environmental disasters

D.

Serious information security incidents

Full Access
Question # 50

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

A.

Risk Identification

B.

Risk Analysis

C.

Risk Reassessment

D.

Risk Avoidance

Full Access
Question # 51

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

A.

Risk Reassessment

B.

Risk Identification

C.

Risk Analysis

D.

Risk Avoidance

Full Access
Question # 52

Which of the following control measures are considered while creating a disaster recovery plan?

Each correct answer represents a part of the solution. Choose three.

A.

Detective measures

B.

Supportive measures

C.

Corrective measures

D.

Preventive measures

Full Access
Question # 53

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

A.

Cyber Incident Response Plan

B.

Crisis Communication Plan

C.

Occupant Emergency Plan

D.

Disaster Recovery Plan

Full Access
Question # 54

Which of the following documents helps disaster recovery team members in getting the alternate sites up and running?

A.

Technical guide

B.

Executive summary

C.

Department-specific plan

D.

Checklist

Full Access
Question # 55

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

A.

Emergency action team

B.

Emergency-management team

C.

Damage-assessment team

D.

Off-site storage team

Full Access
Question # 56

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

A.

Legal value

B.

Recourse record

C.

Fiscal value

D.

Vital record

Full Access
Question # 57

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

A.

RAID-0

B.

RAID-1

C.

RAID-5

D.

RAID-10

Full Access
Question # 58

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.

Ensure that each member of the disaster recovery team is aware of their responsibility.

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that the plan works properly

D.

Ensure that all client computers in the organization are shut down.

Full Access
Question # 59

Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?

A.

PA10

B.

PA06

C.

PA09

D.

PA07

Full Access
Question # 60

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

A.

Checklists

B.

Technical guides

C.

Executive summary

D.

Department-specific plans

Full Access
Question # 61

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

A.

Reset Account Lockout Counter After policy.

B.

Enforce Password Must Meet Complexity Requirements policy.

C.

Set Account Lockout Duration policy.

D.

Set Account Lockout Threshold policy.

Full Access
Question # 62

Fill in the blank:

A ___________plan is a plan devised for a specific situation when things could go wrong.

A.

contingency

Full Access
Question # 63

Which of the following sites is a non-mainstream alternative to a traditional recovery site?

A.

Warm site

B.

Hot site

C.

Mobile site

D.

Cold site

Full Access
Question # 64

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

Each correct answer represents a part of the solution. Choose all that apply.

A.

To verify configuration records and correct any exceptions

B.

To account for all IT assets

C.

To provide precise information support to other ITIL disciplines

D.

To provide a solid base only for Incident and Problem Management

Full Access
Question # 65

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

A.

Quantitative analysis

B.

Estimate activity duration

C.

Risk identification

D.

Qualitative analysis

Full Access
Question # 66

Which of the following values must ensure that the Maximum Tolerable Period of Disruption

(MTPD) for each activity is not exceeded?

A.

Recovery Plan Objective

B.

Recovery Point Objective

C.

Recovery Time Objective

D.

Recovery Impact Objective

Full Access
Question # 67

Which of the following subphases are defined in the maintenance phase of the life cycle models?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Change control

B.

Request control

C.

Release control

D.

Configuration control

Full Access
Question # 68

Fill in the blank:

A______plan is a plan devised for a specific situation when things could go wrong.

A.

contingency

Full Access
Question # 69

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Snooping

B.

Patent

C.

Utility model

D.

Copyright

Full Access
Question # 70

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Structured walk-through test

Full Access
Question # 71

Which of the following backup sites takes the longest recovery time?

A.

Cold backup site

B.

Hot backup site

C.

Warm backup site

D.

Mobile backup site

Full Access
Question # 72

Which of the following classification schemes is considered to be of a personal nature and is

intended for company use only?

A.

Sensitive information

B.

Private information

C.

Public information

D.

Confidential information

Full Access
Question # 73

Which of the following sets of incident response practices is recommended by the CERT/CC?

A.

Prepare, handle, and follow up

B.

Prepare, handle, and notify

C.

Prepare, notify, and follow up

D.

Notify, handle, and follow up

Full Access
Question # 74

Fill in the blank with the appropriate number:

RAID-________ is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 75

Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?

A.

Parallel test

B.

Checklist test

C.

Simulation test

D.

Full-interruption test

Full Access
Question # 76

Which of the following processes is involved in identifying, measuring, and controlling events?

A.

Incident Management

B.

Response Management

C.

Disaster Recovery

D.

Risk Management

Full Access
Question # 77

Which of the following actions can be performed by using the principle of separation of duties?

A.

Developing job descriptions

B.

Identifying critical positions

C.

Conducting background investigation

D.

Reducing the opportunity for fraud

Full Access
Question # 78

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

A.

They support VLSM and discontiguous networks.

B.

The same subnet mask is used everywhere on the network.

C.

They extend the IP addressing scheme.

D.

IGRP is a classless routing protocol.

Full Access
Question # 79

Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?

A.

Emergency action team

B.

Off-site storage team

C.

Emergency management team

D.

Damage assessment team

Full Access
Question # 80

Fill the appropriate power supply form factor in the blank space.

_________form factor is similar to LPX form factor in physical dimensions.

A.

ATX

Full Access
Question # 81

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

A.

Differential phase

B.

Identification phase

C.

Preparation phase

D.

Eradication phase

Full Access
Question # 82

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?

A.

Utility model

B.

Patent

C.

Snooping

D.

Copyright

Full Access
Question # 83

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Brute Force attack

B.

Dictionary attack

C.

Rule based attack

D.

Hybrid attack

Full Access
Question # 84

Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

A.

Configuration identification

B.

Configuration control

C.

Configuration auditing

D.

Documentation control

Full Access
Question # 85

Fill in the blank with the appropriate number:

RAID-________ is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 86

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

A.

Configuration auditing

B.

Configuration identification

C.

Configuration status accounting

D.

Configuration control

Full Access
Question # 87

Which of the following processes acts as a control measure that provides some amount of

protection to the assets?

A.

Risk

B.

Countermeasure

C.

Vulnerability

D.

Safeguard

Full Access