312-76 : EC-Council Disaster Recovery Professional : Part 08
-
Which of the following values specifies the acceptable latency of data that will be recovered?
- Recovery Plan Objective
- Recovery Point Objective
- Recovery Time Objective
- Recovery Target Objective
-
Which of the following events occurs in a system when there is a TCB failure and the recovery procedures cannot return the system to a secure state?
- Fault tolerance
- Cold start
- Fail-over
- Fail-soft
-
In which of the following scenarios is database backup transferred to a remote site in a bulk transfer fashion?
- Remote journaling
- Emergency response
- Remote mirroring
- Electronic vaulting
-
Which of the following sites is a non-mainstream alternative to a traditional recovery site?
- Warm site
- Hot site
- Mobile site
- Cold site
-
Which of the following is a compromise between hot and cold sites?
- Mutual site
- Warm site
- Mobile site
- Reciprocal site
-
Which of the following types of storage requires some direct human action in order to make access to the storage media physically possible?
- Near-line
- Off-line
- On-line
- Far-line
-
Which of the following steps has the goal to reduce the level of risk to the IT system and its data to an acceptable level?
- Recommended Controls
- Results Documentation
- Impact Analysis
- Risk Determination
-
Who among the following has the ultimate responsibility for the protection of the organization’s information?
- Senior management
- Application owner
- User
- Technology provider
-
Which of the following Tier 1 policies will identify who is responsible for what?
- Scope
- Responsibilities
- Compliance or Consequences
- Topic
-
Which of the following global (Tier 1) policies defines what specifically the policy is going to address?
- Responsibilities
- Scope
- Compliance or Consequences
- Topic
-
Which of the following tasks is prioritized the most by the information security strategy?
- Industry best practices
- Technology plans and deliverables
- Business goals and objectives
- Security metrics
-
Which of the following actions can be performed by using the principle of separation of duties?
- Conducting background investigation
- Developing job descriptions
- Reducing the opportunity for fraud
- Identifying critical positions
-
Which of the following functions is performed by change control?
- It tracks changes to system hardware, software, firmware, and documentation.
- It maintains visibility of changes to the system.
- It tracks and approves changes to system hardware, software, firmware, and documentation.
- It ensures that changes to the system are approved.
-
Which of the following is a category of an automated Incident detection process?
- Catastrophe Theory
- Input detection
- Control theory
- OODA looping
-
Which of the following workforces works to handle the incidents in an enterprise?
- Z force
- IEEE Software Development Team
- Computer Emergency Response Team
- Computer Forensics Team
-
Which of the following sets of incident response practices is recommended by the CERT/CC?
- Prepare, handle, and follow up
- Prepare, handle, and notify
- Prepare, notify, and follow up
- Notify, handle, and follow up
-
Which of the following processes helps the business units to understand the impact of a disruptive event?
- Business impact assessment
- Business continuity plan development
- Scope and plan initiation
- Plan approval and implementation
-
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
- Identification phase
- Preparation phase
- Differential phase
- Eradication phase
-
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
- Industry averages
- Tape restore data
- Business impact analysis
- Past recovery test results
-
Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?
- SIIT
- NAT
- NAT-PT
- NAPT-PT
Subscribe
0 Comments
Newest