Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-76 Exam Dumps - Disaster Recovery Professional Practice Test

Go to page:
Question # 17

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Full Access
Question # 18

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

A.

Maximize the decision-making required by personnel during a disaster.

B.

Guarantee the reliability of standby systems through testing and simulation.

C.

Protect an organization from major computer services failure.

D.

Minimize the risk to the organization from delays in providing services.

Full Access
Question # 19

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

A.

Legal value

B.

Recourse record

C.

Fiscal value

D.

Vital record

Full Access
Question # 20

Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?

A.

Corrective measures

B.

Detective measures

C.

Preventive measures

D.

Supportive measures

Full Access
Question # 21

Fill in the blank with the appropriate number:

RAID-________ is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 22

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

A.

Host-Based ID system

B.

Signature-Based ID system

C.

Statistical Anomaly-Based ID system

D.

Network-Based ID system

Full Access
Question # 23

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute Force attack

C.

Rule based attack

D.

Hybrid attack

Full Access
Question # 24

Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?

A.

Off-site storage team

B.

Emergency management team

C.

Damage assessment team

D.

Emergency action team

Full Access
Go to page: