312-76 : EC-Council Disaster Recovery Professional : Part 08

  1. Which of the following values specifies the acceptable latency of data that will be recovered?

    • Recovery Plan Objective
    • Recovery Point Objective
    • Recovery Time Objective
    • Recovery Target Objective
  2. Which of the following events occurs in a system when there is a TCB failure and the recovery procedures cannot return the system to a secure state?

    • Fault tolerance
    • Cold start
    • Fail-over
    • Fail-soft
  3. In which of the following scenarios is database backup transferred to a remote site in a bulk transfer fashion?

    • Remote journaling
    • Emergency response
    • Remote mirroring
    • Electronic vaulting
  4. Which of the following sites is a non-mainstream alternative to a traditional recovery site?

    • Warm site
    • Hot site
    • Mobile site
    • Cold site
  5. Which of the following is a compromise between hot and cold sites?

    • Mutual site
    • Warm site
    • Mobile site
    • Reciprocal site
  6. Which of the following types of storage requires some direct human action in order to make access to the storage media physically possible?

    • Near-line
    • Off-line
    • On-line
    • Far-line
  7. Which of the following steps has the goal to reduce the level of risk to the IT system and its data to an acceptable level?

    • Recommended Controls
    • Results Documentation
    • Impact Analysis
    • Risk Determination
  8. Who among the following has the ultimate responsibility for the protection of the organization’s information?

    • Senior management
    • Application owner
    • User
    • Technology provider
  9. Which of the following Tier 1 policies will identify who is responsible for what?

    • Scope
    • Responsibilities
    • Compliance or Consequences
    • Topic
  10. Which of the following global (Tier 1) policies defines what specifically the policy is going to address?

    • Responsibilities
    • Scope
    • Compliance or Consequences
    • Topic
  11. Which of the following tasks is prioritized the most by the information security strategy?

    • Industry best practices
    • Technology plans and deliverables
    • Business goals and objectives
    • Security metrics
  12. Which of the following actions can be performed by using the principle of separation of duties?

    • Conducting background investigation
    • Developing job descriptions
    • Reducing the opportunity for fraud
    • Identifying critical positions
  13. Which of the following functions is performed by change control?

    • It tracks changes to system hardware, software, firmware, and documentation.
    • It maintains visibility of changes to the system.
    • It tracks and approves changes to system hardware, software, firmware, and documentation.
    • It ensures that changes to the system are approved.
  14. Which of the following is a category of an automated Incident detection process?

    • Catastrophe Theory
    • Input detection
    • Control theory
    • OODA looping
  15. Which of the following workforces works to handle the incidents in an enterprise?

    • Z force
    • IEEE Software Development Team
    • Computer Emergency Response Team
    • Computer Forensics Team
  16. Which of the following sets of incident response practices is recommended by the CERT/CC?

    • Prepare, handle, and follow up
    • Prepare, handle, and notify
    • Prepare, notify, and follow up
    • Notify, handle, and follow up
  17. Which of the following processes helps the business units to understand the impact of a disruptive event?

    • Business impact assessment
    • Business continuity plan development
    • Scope and plan initiation
    • Plan approval and implementation
  18. Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

    • Identification phase
    • Preparation phase
    • Differential phase
    • Eradication phase
  19. Which of the following sources is the best for developing Recovery Time Objectives (RTO)?

    • Industry averages
    • Tape restore data
    • Business impact analysis
    • Past recovery test results
  20. Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?

    • SIIT
    • NAT
    • NAT-PT
    • NAPT-PT