Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 312-76 Disaster Recovery Professional Practice Test is now Stable and With Pass Result

312-76 Practice Exam Questions and Answers

Disaster Recovery Professional Practice Test

Last Update 3 days ago
Total Questions : 290

Disaster Recovery Professional Practice Test is stable now with all latest exam questions are added 3 days ago. Incorporating 312-76 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Disaster Recovery Professional Practice Test exam format, identifying knowledge gaps, applying theoretical knowledge in ECCouncil practical scenarios, you are setting yourself up for success. 312-76 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

312-76 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through 312-76 dumps allows you to practice pacing yourself, ensuring that you can complete all Disaster Recovery Professional Practice Test exam questions within the allotted time frame without sacrificing accuracy.

312-76 PDF

312-76 PDF (Printable)
$48
$119.99

312-76 Testing Engine

312-76 PDF (Printable)
$56
$139.99

312-76 PDF + Testing Engine

312-76 PDF (Printable)
$70.8
$176.99
Question # 1

Which of the following tests activates the total disaster recovery plan?

Options:

A.  

Structured walk-through test

B.  

Full-interruption test

C.  

Parallel test

D.  

Checklist test

Discussion 0
Question # 2

In which of the following prototyping, a version of the system is built to check the requirements and is then discarded?

Options:

A.  

Evolutionary prototyping

B.  

Incremental prototyping

C.  

Project prototyping

D.  

Throw-away prototyping

Discussion 0
Question # 3

Which of the following policies is related to the backup of data?

Options:

A.  

Backup policy

B.  

Network security policy

C.  

User password policy

D.  

Privacy policy

Discussion 0
Question # 4

Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

Options:

A.  

Non-repudiation

B.  

Confidentiality

C.  

Integrity

D.  

Authentication

Discussion 0
Question # 5

Which of the following DRP tests is plan distributed, and reviewed by the business units for its

thoroughness and effectiveness?

Options:

A.  

Functional drill

B.  

Parallel test

C.  

Walk-through drill

D.  

Checklist review

Discussion 0
Question # 6

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability?

Each correct answer represents a part of the solution. Choose three.

Options:

A.  

Recover at the primary operating site

B.  

Recover to an alternate site for critical functions

C.  

Restore full system after a catastrophic loss

D.  

Restore full system at an alternate operating site

Discussion 0
Question # 7

Fill in the blank with the appropriate phrase.

__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.

Options:

A.  

Privilege escalation

Discussion 0
Question # 8

Which of the following statements is related to residual risks?

Options:

A.  

It is the probabilistic risk before implementing all security measures.

B.  

It can be considered as an indicator of threats coupled with vulnerability.

C.  

It is a weakness or lack of safeguard that can be exploited by a threat.

D.  

It is the probabilistic risk after implementing all security measures.

Discussion 0
Question # 9

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

Options:

A.  

Disaster Recovery Plan

B.  

Continuity Of Operations Plan

C.  

Business Continuity Plan

D.  

Contingency Plan

Discussion 0
Question # 10

Which of the following actions can be performed by using the principle of separation of duties?

Options:

A.  

Conducting background investigation

B.  

Developing job descriptions

C.  

Reducing the opportunity for fraud

D.  

Identifying critical positions

Discussion 0
Question # 11

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

They support VLSM and discontiguous networks.

B.  

The same subnet mask is used everywhere on the network.

C.  

They extend the IP addressing scheme.

D.  

IGRP is a classless routing protocol.

Discussion 0
Question # 12

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.  

Risk Identification

B.  

Risk Analysis

C.  

Risk Reassessment

D.  

Risk Avoidance

Discussion 0
Question # 13

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

Options:

A.  

Availability

B.  

Non repudiation

C.  

Confidentiality

D.  

Data Protection

Discussion 0
Question # 14

Which of the following processes is NOT included in the risk mitigation?

Options:

A.  

Risk planning

B.  

Risk limitation

C.  

Risk identi?cation

D.  

Risk assumption

Discussion 0
Question # 15

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.  

Containment

B.  

Preparation

C.  

Identification

D.  

Eradication

Discussion 0
Question # 16

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Risk identification

B.  

Project schedule

C.  

Risk analysis

D.  

Team members list

E.  

Security Threat

Discussion 0
Question # 17

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

Options:

A.  

Legal value

B.  

Recourse record

C.  

Fiscal value

D.  

Vital record

Discussion 0
Question # 18

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.  

User password policy

B.  

Backup policy

C.  

Privacy policy

D.  

Network security policy

Discussion 0
Question # 19

In which of the following DRP tests does a business unit management meet to review the plan?

Options:

A.  

Simulation test

B.  

Parallel test

C.  

Structured walk-through test

D.  

Full-interruption test

Discussion 0
Question # 20

Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?

Options:

A.  

Risk Mitigation

B.  

Risk Transference

C.  

Risk Avoidance

D.  

Risk Acceptance

Discussion 0
Question # 21

Which of the following system security policies is used to address specific issues of concern to the organization?

Options:

A.  

Informative policy

B.  

System-specific policy

C.  

Program policy

D.  

Issue-specific policy

Discussion 0
Question # 22

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Risk identification

B.  

Project schedule

C.  

Risk analysis

D.  

Team members list

Discussion 0
Question # 23

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

Options:

A.  

Cyber Incident Response Plan

B.  

Crisis Communication Plan

C.  

Occupant Emergency Plan

D.  

Disaster Recovery Plan

Discussion 0
Question # 24

Which of the following are common applications that help in replicating and protecting critical information at the time of disaster?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Asynchronous replication

B.  

Synchronous replication

C.  

Tape backup

D.  

Disk mirroring

Discussion 0
Question # 25

Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?

Options:

A.  

Trusted computer system

B.  

Security perimeter

C.  

Abstraction

D.  

Trusted path

Discussion 0
Question # 26

Which of the following techniques is an encryption method that uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

Options:

A.  

DES

B.  

IDEA

C.  

PGP

D.  

AES

Discussion 0
Question # 27

Which of the following terms describes the determination of the effect of changes to the

information system on the security of the information system?

Options:

A.  

Validation analysis

B.  

Impact analysis

C.  

Authentication

D.  

Verification

Discussion 0
Question # 28

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.  

Communications Management Plan

B.  

Resource Management Plan

C.  

Risk Management Plan

D.  

Stakeholder management strategy

Discussion 0
Question # 29

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Dictionary attack

B.  

Brute Force attack

C.  

Rule based attack

D.  

Hybrid attack

Discussion 0
Question # 30

Which of the following control measures are considered while creating a disaster recovery plan?

Each correct answer represents a part of the solution. Choose three.

Options:

A.  

Detective measures

B.  

Supportive measures

C.  

Corrective measures

D.  

Preventive measures

Discussion 0
Question # 31

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

Options:

A.  

Authentication

B.  

Confidentiality

C.  

Non-repudiation

D.  

Integrity

Discussion 0
Question # 32

Which of the following security procedures is NOT related to the SDLC's disposition?

Options:

A.  

Media sanitation

B.  

Information preservation

C.  

Hardware and software disposal

D.  

Security certification

Discussion 0
Question # 33

Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?

Options:

A.  

Business Continuity Strategy

B.  

Index of Disaster-Relevant Information

C.  

Disaster Invocation Guideline

D.  

Availability/ ITSCM/ Security Testing Schedule

Discussion 0
Question # 34

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.  

Risk Reassessment

B.  

Risk Identification

C.  

Risk Analysis

D.  

Risk Avoidance

Discussion 0
Question # 35

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.  

Organizing a solution to remove an incident

B.  

Setting up the initial position after an incident

C.  

Building up an incident response kit

D.  

Working with QA to validate security of the enterprise

Discussion 0
Question # 36

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

Options:

A.  

Non repudiation

B.  

Data Protection

C.  

Availability

D.  

Confidentiality

Discussion 0
Question # 37

Drag and drop the appropriate team names in front of their respective responsibilities.

Question # 37

Options:

A.  

Discussion 0
Question # 38

Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?

Options:

A.  

Emergency action team

B.  

Off-site storage team

C.  

Emergency management team

D.  

Damage assessment team

Discussion 0
Question # 39

Which of the following parts of BS 7799 covers risk analysis and management?

Options:

A.  

Part 4

B.  

Part 1

C.  

Part 2

D.  

Part 3

Discussion 0
Question # 40

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

Options:

A.  

Configuration auditing

B.  

Configuration identification

C.  

Configuration status accounting

D.  

Configuration control

Discussion 0
Question # 41

Which of the following tests activates the total disaster recovery plan?

Options:

A.  

Full-interruption test

B.  

Structured walk-through test

C.  

Checklist test

D.  

Parallel test

Discussion 0
Question # 42

Which of the following processes acts as a control measure that provides some amount of

protection to the assets?

Options:

A.  

Risk

B.  

Countermeasure

C.  

Vulnerability

D.  

Safeguard

Discussion 0
Question # 43

Which of the following contract types is described in the statement below?

"The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs."

Options:

A.  

Fixed Price Incentive Fee Contracts (FPIF)

B.  

Cost Plus Fixed Fee Contracts (CPFF)

C.  

Cost Plus Incentive Fee Contracts (CPIF)

D.  

Firm Fixed Price Contracts (FFP)

Discussion 0
Get 312-76 dumps and pass your exam in 24 hours!

Free Exams Sample Questions