312-76 - Disaster Recovery Professional

Go back to ECCouncil

Example Questions

Fill the appropriate power supply form factor in the blank space. _________form factor is similar to LPX form factor in physical dimensions. Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster? Which of the following sub-processes of IT Service Continuity Management is used to make sure that all members of IT staff with responsibilities for fighting disasters are aware of their exactduties? Which of the following events occurs in a system when there is a TCB failure and the recovery procedures cannot return the system to a secure state? ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains? Each correct answer represents a complete solution. Choose all that apply. Which of the following processes helps the business units to understand the impact of a disruptive event? Which of the following system security policies is used to address specific issues of concern to the organization? Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data? Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network? A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan? Each correct answer represents a complete solution. Choose all that apply. Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover? Fill in the blank with the appropriate number: RAID-________ is a combination of RAID-1 and RAID-0. Fill the measurement of SFX form factor style power supply in the blank space. The SFX form factor style power supply is______mm wide, ______mm deep, and______ mm in height. Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts? Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three. Which of the following statements are true about an APW (Air Pressurized Water) extinguisher? Each correct answer represents a complete solution. Choose all that apply. Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms? Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system? Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three. Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic? Which of the following cryptographic system services assures the receiver that the received message has not been altered? Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis? Which of the following control measures are considered while creating a disaster recovery plan? Each correct answer represents a part of the solution. Choose three. Which of the following scripts is included as a part of disaster recovery plan to confirm that everything is working as intended? Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement? Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation? Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan? Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs? Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management? You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed? Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian? Which of the following documents is necessary to continue the business in the event of disaster or emergency? Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing? Mark works as a Network Administrator for NetTech Inc. Mark is testing the disaster recovery plan of the company. During the testing of the recovery plan, he finds that some servers have been restored with another server's data. What will Mark do to improve the disaster recovery plan? Which of the following processes acts as a control measure that provides some amount of protection to the assets? Which of the following terms describes the determination of the effect of changes to the information system on the security of the information system? You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items? Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity? Which of the following ensures that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)? You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task? Which of the following steps has the goal to reduce the level of risk to the IT system and its data to an acceptable level? Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? Each correct answer represents a part of the solution. Choose all that apply. Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization? Which of the following security procedures is NOT related to the SDLC's disposition? You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task? Which of the following processes is required for effective business continuity and disaster- recovery planning? Which of the following should the administrator ensure during the test of a disaster recovery plan? You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability? Each correct answer represents a part of the solution. Choose three. Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project? Which of the following backup sites takes the longest recovery time?