312-76 : EC-Council Disaster Recovery Professional : Part 03

  1. DRAG DROP

    Choose the steps involved in the general disaster recovery procedure.

    312-76 Part 03 Q01 001
    312-76 Part 03 Q01 001
    312-76 Part 03 Q01 002
    312-76 Part 03 Q01 002
  2. Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?

    • Hot backup site
    • Cold backup site
    • Mobile backup site
    • Warm backup site
  3. Which of the following subphases are defined in the maintenance phase of the life cycle models?

    Each correct answer represents a part of the solution. Choose all that apply.

    • Change control
    • Request control
    • Release control
    • Configuration control
  4. SIMULATION

    Fill in the blank:

    An ___________________ (AS) is a group of networks under a single administration and with single routing policies.

    • Autonomous System
  5. Which of the following best describes the identification, analysis, and ranking of risks?

    • Fixed-price contract
    • Design of experiments
    • Fast tracking
    • Plan Risk management
  6. Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?

    • Occupant Emergency Plan
    • Disaster Recovery Plan
    • Cyber Incident Response Plan
    • Crisis Communication Plan
  7. Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

    • Cyber Incident Response Plan
    • Crisis Communication Plan
    • Occupant Emergency Plan
    • Disaster Recovery Plan
  8. Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?

    • Emergency action team
    • Off-site storage team
    • Emergency management team
    • Damage assessment team
  9. SIMULATION

    Fill the appropriate power supply form factor in the blank space.
    _________ form factor is similar to LPX form factor in physical dimensions.

    • ATX
  10. Which of the following are common applications that help in replicating and protecting critical information at the time of disaster?

    Each correct answer represents a complete solution. Choose all that apply.

    • Asynchronous replication
    • Synchronous replication
    • Tape backup
    • Disk mirroring
  11. Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

    Each correct answer represents a part of the solution. Choose all that apply.

    • To verify configuration records and correct any exceptions
    • To account for all IT assets
    • To provide precise information support to other ITIL disciplines
    • To provide a solid base only for Incident and Problem Management
  12. Which of the following plans provides procedures for recovering business operations immediately following a disaster?

    • Business recovery plan
    • Continuity of operation plan
    • Disaster recovery plan
    • Business continuity plan
  13. You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

    • Configuration auditing
    • Configuration identification
    • Configuration status accounting
    • Configuration control
  14. You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

    • Risk audits
    • Qualitative risk analysis
    • Quantitative risk analysis
    • Requested changes
  15. SIMULATION

    Fill in the blank with the appropriate phrase.

    __________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.

    • Privilege escalation
  16. Which of the following procedures can be broadly defined as the plan for the exchange of information before, during, or after a crisis event?

    • Occupant Emergency Plan
    • Crisis Communication Plan
    • Cyber Incident Response Plan
    • Disaster Recovery Plan
  17. Which of the following processes identifies the threats that can impact the business continuity of operations?

    • Business impact analysis
    • Function analysis
    • Requirement analysis
    • Risk analysis
  18. Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?

    • Corrective measures
    • Detective measures
    • Preventive measures
    • Supportive measures
  19. Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

    • Non-repudiation
    • Confidentiality
    • Authentication
    • Integrity
  20. Which of the following cryptographic system services proves a user’s identity?

    • Confidentiality
    • Non-repudiation
    • Integrity
    • Authentication
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments