Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

312-76 Disaster Recovery Professional Practice Test Questions and Answers

Questions 4

Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?

Options:

A.

Business Continuity Strategy

B.

Index of Disaster-Relevant Information

C.

Disaster Invocation Guideline

D.

Availability/ ITSCM/ Security Testing Schedule

Buy Now
Questions 5

Which of the following values must ensure that the Maximum Tolerable Period of Disruption

(MTPD) for each activity is not exceeded?

Options:

A.

Recovery Plan Objective

B.

Recovery Point Objective

C.

Recovery Time Objective

D.

Recovery Impact Objective

Buy Now
Questions 6

Which of the following is a duplicate of the original site of an organization, with fully working

systems as well as near-complete backups of user data?

Options:

A.

Hot site

B.

Cold site

C.

Warm site

D.

Data site

Buy Now
Questions 7

Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?

Options:

A.

Hot backup site

B.

Cold backup site

C.

Mobile backup site

D.

Warm backup site

Buy Now
Questions 8

Which of the following Tier 1 policies will identify who is responsible for what?

Options:

A.

Responsibilities

B.

Compliance or Consequences

C.

Scope

D.

Topic

Buy Now
Questions 9

Which of the following provides a means of predicting the outcome of the next software project conducted by an organization?

Options:

A.

Software process capability

B.

Software process maturity

C.

Software process performance

D.

Software security engineering

Buy Now
Questions 10

Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

Options:

A.

Configuration identification

B.

Documentation control

C.

Configuration auditing

D.

Configuration control

Buy Now
Questions 11

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Buy Now
Questions 12

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Qualitative analysis

B.

Estimate activity duration

C.

Quantitative analysis

D.

Risk identification

Buy Now
Questions 13

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Snooping

B.

Patent

C.

Utility model

D.

Copyright

Buy Now
Questions 14

In which of the following DRP tests does a business unit management meet to review the plan?

Options:

A.

Simulation test

B.

Parallel test

C.

Structured walk-through test

D.

Full-interruption test

Buy Now
Questions 15

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Maximize the decision-making required by personnel during a disaster.

B.

Guarantee the reliability of standby systems through testing and simulation.

C.

Protect an organization from major computer services failure.

D.

Minimize the risk to the organization from delays in providing services.

Buy Now
Questions 16

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

Options:

A.

Legal value

B.

Recourse record

C.

Fiscal value

D.

Vital record

Buy Now
Questions 17

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

Options:

A.

Asterisk logger

B.

FAU

C.

Access Pass View

D.

Galleta

Buy Now
Questions 18

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

Options:

A.

Reset Account Lockout Counter After policy.

B.

Enforce Password Must Meet Complexity Requirements policy.

C.

Set Account Lockout Duration policy.

D.

Set Account Lockout Threshold policy.

Buy Now
Questions 19

Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?

Options:

A.

Host-based ID system

B.

Behavior-based ID system

C.

Network-based ID system

D.

Signature-Based ID system

Buy Now
Questions 20

Which of the following types of agreement can be a legally binding formal or informal "contract"?

Options:

A.

Non-disclosure agreement

B.

Consulting agreement

C.

Cooperative agreement

D.

Service level agreement

Buy Now
Questions 21

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?

Options:

A.

Utility model

B.

Copyright

C.

Snooping

D.

Patent

Buy Now
Questions 22

Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

Options:

A.

Configuration identification

B.

Configuration control

C.

Configuration auditing

D.

Documentation control

Buy Now
Questions 23

Which of the following techniques is an encryption method that uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

Options:

A.

DES

B.

IDEA

C.

PGP

D.

AES

Buy Now
Questions 24

Which of the following strategies is used to minimize the effects of a disruptive event on a

company, and is created to prevent interruptions to normal business activity?

Options:

A.

Business Continuity Plan

B.

Disaster Recovery Plan

C.

Continuity of Operations Plan

D.

Contingency Plan

Buy Now
Questions 25

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Setting up the initial position after an incident

B.

Organizing a solution to remove an incident

C.

Working with QA to validate security of the enterprise

D.

Building up an incident response kit

Buy Now
Questions 26

Mark works as a Network Administrator for NetTech Inc. Mark is testing the disaster recovery plan of the company. During the testing of the recovery plan, he finds that some servers have been restored with another server's data. What will Mark do to improve the disaster recovery plan?

Options:

A.

Maintain a hard copy of the data stored on the server.

B.

Remember which tape drive stores which server's data.

C.

Implement the cluster server.

D.

Maintain a printed tape backup report.

Buy Now
Questions 27

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

Options:

A.

AES

B.

DES

C.

IDEA

D.

PGP

Buy Now
Questions 28

Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?

Options:

A.

Separation of duties

B.

Need to Know

C.

Segregation of duties

D.

Due care

Buy Now
Questions 29

Drag and drop the appropriate team names in front of their respective responsibilities.

312-76 Question 29

Options:

A.
Buy Now
Questions 30

Which of the following parts of BS 7799 covers risk analysis and management?

Options:

A.

Part 4

B.

Part 1

C.

Part 2

D.

Part 3

Buy Now
Questions 31

Which of the following stages of the business continuity planning life cycle focuses on the

execution and testing of the individual solution designs developed?

Options:

A.

Testing and acceptance stage

B.

Solution design stage

C.

Analysis stage

D.

Implementation stage

Buy Now
Questions 32

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Team members list

C.

Risk analysis

D.

Project schedule

Buy Now
Questions 33

Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

Options:

A.

Risk Reassessment

B.

Risk Identification

C.

Risk Analysis

D.

Risk Avoidance

Buy Now
Questions 34

Which of the following command line tools are available in Helix Live acquisition tool on Windows?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

netstat

B.

whois

C.

cab extractors

D.

ipconfig

Buy Now
Questions 35

Which of the following best describes the identification, analysis, and ranking of risks?

Options:

A.

Fixed-price contract

B.

Design of experiments

C.

Fast tracking

D.

Plan Risk management

Buy Now
Questions 36

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Quantitative analysis

B.

Estimate activity duration

C.

Risk identification

D.

Qualitative analysis

Buy Now
Questions 37

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Risk analysis

D.

Team members list

Buy Now
Questions 38

Which of the following security procedures is related to the SDLC's implementation?

Options:

A.

Risk assessment

B.

Security accreditation

C.

Media sanitation

D.

Information preservation

Buy Now
Questions 39

Which of the following individuals incorporates risk assessment in training programs for the

organization's personnel?

Options:

A.

Chief information officer

B.

Information system security officer

C.

Functional manager

D.

Security awareness trainer

Buy Now
Questions 40

Which of the following events occurs in a system when there is a TCB failure and the recovery

procedures cannot return the system to a secure state?

Options:

A.

Fault tolerance

B.

Cold start

C.

Fail-over

D.

Fail-soft

Buy Now
Questions 41

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

Options:

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Buy Now
Questions 42

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

The same subnet mask is used everywhere on the network.

B.

They extend the IP addressing scheme.

C.

IGRP is a classless routing protocol.

D.

They support VLSM and discontiguous networks.

Buy Now
Questions 43

Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

Options:

A.

Tape restore data

B.

Past recovery test results

C.

Industry averages

D.

Business impact analysis

Buy Now
Exam Code: 312-76
Exam Name: Disaster Recovery Professional Practice Test
Last Update: Nov 16, 2024
Questions: 290

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now 312-76 testing engine

PDF (Q&A)

$35  $99.99
buy now 312-76 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 22 Nov 2024