Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-76 Exam Dumps - Disaster Recovery Professional Practice Test

Go to page:
Question # 25

You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?

A.

Configuration auditing

B.

Configuration identification

C.

Configuration control

D.

Configuration status accounting

Full Access
Question # 26

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

A.

AES

B.

DES

C.

IDEA

D.

PGP

Full Access
Question # 27

Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?

A.

Disaster Recovery Plan

B.

Crisis Communication Plan

C.

Cyber Incident Response Plan

D.

Occupant Emergency Plan

Full Access
Question # 28

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

A.

Host-Based ID system

B.

Signature-Based ID system

C.

Statistical Anomaly-Based ID system

D.

Network-Based ID system

Full Access
Question # 29

Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?

A.

Parallel test

B.

Checklist test

C.

Simulation test

D.

Full-interruption test

Full Access
Question # 30

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Structured walk-through test

Full Access
Question # 31

Which of the following Tier 1 policies will identify who is responsible for what?

A.

Responsibilities

B.

Compliance or Consequences

C.

Scope

D.

Topic

Full Access
Question # 32

Which of the following defines the communication link between a Web server and Web applications?

A.

IETF

B.

Firewall

C.

PGP

D.

CGI

Full Access
Go to page: