Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-76 Exam Dumps - Disaster Recovery Professional Practice Test

Go to page:
Question # 33

Which of the following phases is the first step towards creating a business continuity plan?

A.

Business Impact Assessment

B.

Plan Approval and Implementation

C.

Business Continuity Plan Development

D.

Scope and Plan Initiation

Full Access
Question # 34

Which of the following events occurs in a system when there is a TCB failure and the recovery

procedures cannot return the system to a secure state?

A.

Fault tolerance

B.

Cold start

C.

Fail-over

D.

Fail-soft

Full Access
Question # 35

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

A.

RAID-5

B.

RAID-0

C.

RAID-1

D.

RAID-10

Full Access
Question # 36

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

A.

RTA

B.

RPO

C.

RCO

D.

RTO

Full Access
Question # 37

Which of the following actions can be performed by using the principle of separation of duties?

A.

Developing job descriptions

B.

Identifying critical positions

C.

Conducting background investigation

D.

Reducing the opportunity for fraud

Full Access
Question # 38

Which of the following tests activates the total disaster recovery plan?

A.

Full-interruption test

B.

Structured walk-through test

C.

Checklist test

D.

Parallel test

Full Access
Question # 39

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Risk identification

B.

Team members list

C.

Risk analysis

D.

Project schedule

Full Access
Question # 40

Which of the following security procedures is related to the SDLC's implementation?

A.

Risk assessment

B.

Security accreditation

C.

Media sanitation

D.

Information preservation

Full Access
Go to page: