Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

312-76 Questions and Answers

Question # 6

Which of the following documents is necessary to continue the business in the event of disaster or emergency?

A.

Legal value

B.

Recourse record

C.

Fiscal value

D.

Vital record

Full Access
Question # 7

Fill in the blank:

A ___________plan is a plan devised for a specific situation when things could go wrong.

A.

contingency

Full Access
Question # 8

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

A.

Broadcast storm

B.

Password sniffing

C.

DoS attack

D.

IP spoofing

Full Access
Question # 9

Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?

A.

CERT

B.

CSIRT

C.

FedCIRC

D.

FIRST

Full Access
Question # 10

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

A.

Technical guides

B.

Executive summary

C.

Checklists

D.

Department-specific plans

Full Access
Question # 11

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.

A.

100

Full Access
Question # 12

Which of the following statements about disaster recovery plan documentation are true? Each correct answer represents a complete solution. Choose all that apply.

A.

The documentation regarding a disaster recovery plan should be stored in backup tapes.

B.

The disaster recovery plan documentation should be stored offsite only.

C.

The documentation regarding a disaster recovery plan should be stored in floppy disks.

D.

The disaster recovery plan documentation should be stored onsite only.

Full Access
Question # 13

Which of the following statements about disaster recovery plan documentation are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

The documentation regarding a disaster recovery plan should be stored in backup tapes.

B.

The documentation regarding a disaster recovery plan should be stored in floppy disks.

C.

The disaster recovery plan documentation should be stored onsite only.

D.

The disaster recovery plan documentation should be stored offsite only.

Full Access
Question # 14

Fill in the blank with the appropriate number:

RAID-________ is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 15

Which of the following phases is the first step towards creating a business continuity plan?

A.

Business Impact Assessment

B.

Plan Approval and Implementation

C.

Business Continuity Plan Development

D.

Scope and Plan Initiation

Full Access
Question # 16

Which of the following parts of BS 7799 covers risk analysis and management?

A.

Part 4

B.

Part 1

C.

Part 2

D.

Part 3

Full Access
Question # 17

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

Full Access
Question # 18

Which of the following values must ensure that the Maximum Tolerable Period of Disruption

(MTPD) for each activity is not exceeded?

A.

Recovery Plan Objective

B.

Recovery Point Objective

C.

Recovery Time Objective

D.

Recovery Impact Objective

Full Access
Question # 19

Fill in the blank with the appropriate number:

RAID-______is a combination of RAID-1 and RAID-0.

A.

10

Full Access
Question # 20

Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?

A.

RAID-10

B.

RAID-5

C.

RAID-0

D.

RAID-1

Full Access
Question # 21

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A.

Continuity of Operations Plan

B.

Disaster Recovery Plan

C.

Business Continuity Plan

D.

Contingency Plan

Full Access
Question # 22

Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?

A.

Software team

B.

Off-site storage team

C.

Emergency-management team

D.

Applications team

Full Access
Question # 23

Which of the following processes is used by organizations to set the risk tolerance, identify the potential risks, and prioritize the tolerance for risk?

A.

Risk communication

B.

Risk identification

C.

Risk management

D.

Risk analysis

Full Access
Question # 24

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

A.

Quantitative risk analysis

B.

Risk audits

C.

Requested changes

D.

Qualitative risk analysis

Full Access
Question # 25

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

A.

Privacy

B.

Availability

C.

Integrity

D.

Confidentiality

Full Access
Question # 26

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Full Access
Question # 27

Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?

A.

Emergency-management team

B.

Off-site storage team

C.

Software team

D.

Applications team

Full Access
Question # 28

Which of the following terms describes the determination of the effect of changes to the

information system on the security of the information system?

A.

Validation analysis

B.

Impact analysis

C.

Authentication

D.

Verification

Full Access
Question # 29

Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?

Each correct answer represents a complete solution. Choose all that apply.

A.

It is a golden color extinguisher that is filled with about 9.5 gallons (approx. 39 liters) of ordinary tap water.

B.

It uses water and pressure to stifle the heat of fire.

C.

It is also known as a class C fire extinguisher.

D.

It should never be used on grease fires, electrical fires, or class D fires.

Full Access
Question # 30

Which of the following processes identifies the threats that can impact the business continuity of operations?

A.

Business impact analysis

B.

Function analysis

C.

Requirement analysis

D.

Risk analysis

Full Access
Question # 31

Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?

A.

Risk transference

B.

Risk avoidance

C.

Risk reduction

D.

Risk acceptance

Full Access
Question # 32

Which of the following sets of incident response practices is recommended by the CERT/CC?

A.

Prepare, handle, and follow up

B.

Prepare, handle, and notify

C.

Prepare, notify, and follow up

D.

Notify, handle, and follow up

Full Access
Question # 33

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

A.

Host-Based ID system

B.

Signature-Based ID system

C.

Statistical Anomaly-Based ID system

D.

Network-Based ID system

Full Access
Question # 34

Which of the following types of control gives an instance of the audit log?

A.

Preventive

B.

Detection

C.

Containment

D.

Recovery

Full Access
Question # 35

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Risk identification

B.

Project schedule

C.

Risk analysis

D.

Team members list

E.

Security Threat

Full Access
Question # 36

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute Force attack

C.

Rule based attack

D.

Hybrid attack

Full Access
Question # 37

Which of the following values specifies the acceptable latency of data that will be recovered?

A.

Recovery Plan Objective

B.

Recovery Point Objective

C.

Recovery Time Objective

D.

Recovery Target Objective

Full Access
Question # 38

Which of the following tasks is prioritized the most by the information security strategy?

A.

Industry best practices

B.

Technology plans and deliverables

C.

Business goals and objectives

D.

Security metrics

Full Access
Question # 39

Which of the following strategies is used to minimize the effects of a disruptive event on a

company, and is created to prevent interruptions to normal business activity?

A.

Business Continuity Plan

B.

Disaster Recovery Plan

C.

Continuity of Operations Plan

D.

Contingency Plan

Full Access
Question # 40

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

A.

Host-Based ID system

B.

Statistical Anomaly-Based ID system

C.

Signature-Based ID system

D.

Network-Based ID system

Full Access
Question # 41

Which of the following statements about a certification authority (CA) is true?

A.

It is a business-to-consumer (B2C) commerce model that is used for high-volume transacti ons.

B.

It is a non-profit organization that sets security standards for e-commerce.

C.

It issues physical certificates that confirm the identity of entities.

D.

It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

Full Access
Question # 42

Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?

A.

Hot backup site

B.

Cold backup site

C.

Mobile backup site

D.

Warm backup site

Full Access
Question # 43

Which of the following control measures are considered while creating a disaster recovery plan?

Each correct answer represents a part of the solution. Choose three.

A.

Detective measures

B.

Supportive measures

C.

Corrective measures

D.

Preventive measures

Full Access