Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following security procedures is related to the SDLC's implementation?
Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
Which of the following terms describes the determination of the effect of changes to the
information system on the security of the information system?
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
Which of the following Tier 1 policies will identify who is responsible for what?
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
Which of the following processes identifies the threats that can impact the business continuity of operations?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?
Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.
Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?
Which of the following is a duplicate of the original site of an organization, with fully working
systems as well as near-complete backups of user data?
Which of the following global (Tier 1) policies de?nes what speci?cally the policy is going to
address?
Which of the following types of storage requires some direct human action in order to make
access to the storage media physically possible?
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
Which of the following acts of information security governance affects the financial institutions?
Which of the following ensures that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?
Which of the following DRP tests is plan distributed, and reviewed by the business units for its
thoroughness and effectiveness?
Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?
Which of the following classification schemes is considered to be of a personal nature and is
intended for company use only?
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Certified Ethical Hacker | 312-76 Questions Answers | 312-76 Test Prep | Disaster Recovery Professional Practice Test Questions PDF | 312-76 Online Exam | 312-76 Practice Test | 312-76 PDF | 312-76 Test Questions | 312-76 Study Material | 312-76 Exam Preparation | 312-76 Valid Dumps | 312-76 Real Questions | Certified Ethical Hacker 312-76 Exam Questions