New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

312-76 Disaster Recovery Professional Practice Test Questions and Answers

Questions 4

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

Options:

A.

Emergency action team

B.

Emergency-management team

C.

Damage-assessment team

D.

Off-site storage team

Buy Now
Questions 5

Which of the following security procedures is related to the SDLC's implementation?

Options:

A.

Risk assessment

B.

Media sanitation

C.

Security accreditation

D.

Information preservation

Buy Now
Questions 6

Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?

Options:

A.

Restore the data.

B.

E-mail the data.

C.

Print the data.

D.

Backup the data.

Buy Now
Questions 7

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Buy Now
Questions 8

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Risk analysis

D.

Team members list

E.

Security Threat

Buy Now
Questions 9

Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?

Options:

A.

PA09

B.

PA07

C.

PA06

D.

PA10

Buy Now
Questions 10

Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?

Options:

A.

SIIT

B.

NAT

C.

NAT-PT

D.

NAPT-PT

Buy Now
Questions 11

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

Options:

A.

IDEA

B.

PGP

C.

DES

D.

AES

Buy Now
Questions 12

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

Options:

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Buy Now
Questions 13

Which of the following RAID levels provides fault tolerance?

Options:

A.

RAID-5

B.

RAID-1

C.

RAID-10

D.

RAID-0

Buy Now
Questions 14

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

Options:

A.

Checklists

B.

Technical guides

C.

Executive summary

D.

Department-specific plans

Buy Now
Questions 15

Which of the following processes is NOT included in the risk mitigation?

Options:

A.

Risk planning

B.

Risk limitation

C.

Risk identi?cation

D.

Risk assumption

Buy Now
Questions 16

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

Options:

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Buy Now
Questions 17

Which of the following terms describes the determination of the effect of changes to the

information system on the security of the information system?

Options:

A.

Verification

B.

Authentication

C.

Impact analysis

D.

Validation analysis

Buy Now
Questions 18

Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?

Options:

A.

The custodian makes the initial information classification assignments and the operations manager implements the scheme.

B.

The custodian implements the information classification scheme after the initial assignment by the operations manager.

C.

The data custodian implements the information classification scheme after the initial assignment by the data owner.

D.

The data owner implements the information classification scheme after the initial assignment by the custodian.

Buy Now
Questions 19

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Snooping

B.

Patent

C.

Utility model

D.

Copyright

Buy Now
Questions 20

Which of the following Tier 1 policies will identify who is responsible for what?

Options:

A.

Responsibilities

B.

Compliance or Consequences

C.

Scope

D.

Topic

Buy Now
Questions 21

Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?

Options:

A.

Risk transference

B.

Risk avoidance

C.

Risk reduction

D.

Risk acceptance

Buy Now
Questions 22

Which of the following parts of BS 7799 covers risk analysis and management?

Options:

A.

Part 4

B.

Part 1

C.

Part 2

D.

Part 3

Buy Now
Questions 23

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

Options:

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Buy Now
Questions 24

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Business impact analysis

B.

Function analysis

C.

Requirement analysis

D.

Risk analysis

Buy Now
Questions 25

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.

Tape restore data

B.

Past recovery test results

C.

Industry averages

D.

Business impact analysis

Buy Now
Questions 26

Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?

Options:

A.

Emergency action team

B.

Off-site storage team

C.

Emergency management team

D.

Damage assessment team

Buy Now
Questions 27

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

Options:

A.

Simulation test

B.

Parallel test

C.

Full-interruption test

D.

Structured walk-through test

Buy Now
Questions 28

Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?

Options:

A.

Capacity Management

B.

Service Level Management

C.

Service Continuity Management

D.

Service Reporting

Buy Now
Questions 29

Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Non-repudiation

B.

Confidentiality

C.

Authentication

D.

Integrity

Buy Now
Questions 30

Which of the following control measures are considered while creating a disaster recovery plan?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Detective measures

B.

Supportive measures

C.

Corrective measures

D.

Preventive measures

Buy Now
Questions 31

Fill in the blank with the appropriate number:

RAID-________ is a combination of RAID-1 and RAID-0.

Options:

A.

10

Buy Now
Questions 32

Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?

Options:

A.

Disaster Recovery Plan

B.

Crisis Communication Plan

C.

Cyber Incident Response Plan

D.

Occupant Emergency Plan

Buy Now
Questions 33

Which of the following is a duplicate of the original site of an organization, with fully working

systems as well as near-complete backups of user data?

Options:

A.

Hot site

B.

Cold site

C.

Warm site

D.

Data site

Buy Now
Questions 34

Which of the following global (Tier 1) policies de?nes what speci?cally the policy is going to

address?

Options:

A.

Responsibilities

B.

Scope

C.

Compliance or Consequences

D.

Topic

Buy Now
Questions 35

Which of the following types of storage requires some direct human action in order to make

access to the storage media physically possible?

Options:

A.

Near-line

B.

Off-line

C.

On-line

D.

Far-line

Buy Now
Questions 36

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:

A.

RTA

B.

RPO

C.

RCO

D.

RTO

Buy Now
Questions 37

Which of the following acts of information security governance affects the financial institutions?

Options:

A.

Sarbanes-Oxley Act of 2002

B.

Health Insurance Privacy and Accountability Act (HIPAA)

C.

California Database Security Breach Information Act

D.

Gramm-Leach-Bliley Act of 1999

Buy Now
Questions 38

Which of the following ensures that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

Options:

A.

The IT Security Manager

B.

The Change Manager

C.

The Service Level Manager

D.

The Configuration Manager

Buy Now
Questions 39

Which of the following DRP tests is plan distributed, and reviewed by the business units for its

thoroughness and effectiveness?

Options:

A.

Functional drill

B.

Parallel test

C.

Walk-through drill

D.

Checklist review

Buy Now
Questions 40

Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?

Options:

A.

Separation of duties

B.

Need to Know

C.

Segregation of duties

D.

Due care

Buy Now
Questions 41

Which of the following classification schemes is considered to be of a personal nature and is

intended for company use only?

Options:

A.

Sensitive information

B.

Private information

C.

Public information

D.

Confidential information

Buy Now
Questions 42

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

Options:

A.

Technical guides

B.

Executive summary

C.

Checklists

D.

Department-specific plans

Buy Now
Questions 43

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Options:

A.

Disaster Recovery Plan

B.

Business Continuity Plan

C.

Contingency Plan

D.

Continuity of Operations Plan

Buy Now
Exam Code: 312-76
Exam Name: Disaster Recovery Professional Practice Test
Last Update: Dec 26, 2024
Questions: 290
312-76 pdf

312-76 PDF

$25.5  $84.99
312-76 Engine

312-76 Testing Engine

$30  $99.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$40.5  $134.99