Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

312-76 Questions and Answers

Question # 6

Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?

A.

Three Tier

B.

Client-Server

C.

Peer-to-Peer

D.

N-Tier

Full Access
Question # 7

Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?

A.

Operations Team

B.

Support Team

C.

Planning Team

D.

Technology Team

Full Access
Question # 8

To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?

A.

ISO 27001

B.

INCITS 483-2012

C.

ISO 27031

D.

ISO/IEC 27005

Full Access
Question # 9

Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?

A.

Delete the child disk of the snapshots present in the host machine

B.

Delete the virtual machine database

C.

Uninstall the Hypervisor

D.

Shut down or restart the virtual machine system

Full Access
Question # 10

Joanna installed a software on her office computer that backed up, restored, and recovered database files. The software performed these functions using database server sessions. Which software did Joanna install?

A.

Virtuozzo

B.

Disk Drill

C.

Recuva

D.

RMAN

Full Access
Question # 11

Which of the following technologies is used to create a copy of data on one server on another server?

A.

Failover Cluster

B.

Snapshots Data

C.

Replication

D.

Cloud Storage

Full Access
Question # 12

Which of the following is NOT a component of a centralized governance structure for Business Continuity and Risk Management?

A.

Programs and Practices

B.

Enablement

C.

Effectiveness

D.

Authenticity

Full Access
Question # 13

Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decide to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data. Which RAID level is used here?

A.

RAID 0

B.

RAID 1

C.

RAID 3

D.

RAID 5

Full Access
Question # 14

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Full Access
Question # 15

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Full Access
Question # 16

Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?

A.

Availability

B.

Integrity

C.

Nonrepudiation

D.

Precaution

Full Access
Question # 17

Matt wants his organization to be prepared for any disaster that may occur in the future. In his preparations for the same, he wants to implement a robust storage system for his servers. After conducting thorough research, he arrives at the conclusion that PASIS architecture would be best suited for his requirements as it combines several critical components to provide survivable data storage. Which of the following components does the PASIS architecture integrate?

A.

Centralized Storage Systems, Deduplication, and Mirroring

B.

Distributed Computing, Data Redundancy and Encoding, and Dynamic Self-Maintenance

C.

Decentralized Storage Systems, Data Redundancy and Encoding, and Dynamic Self-Maintenance

D.

Centralized Computing, Data Redundancy and Encoding

Full Access
Question # 18

Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?

A.

System Migration

B.

System Backup

C.

System Replication

D.

System Recovery

Full Access
Question # 19

When information availability increases in PASIS architecture, which feature decreases as a result?

A.

Nonrepudiation

B.

Durability

C.

Confidentiality

D.

Latency

Full Access
Question # 20

Which of the following options must be considered by an organization when conducting BIA?

A.

Transferring a business activity to a third-party

B.

Ceasing or changing a business activity if viable alternatives are available

C.

Time scales for assessment

D.

Establishing alternate processes or creating redundancy/spare capacity in processes

Full Access
Question # 21

Which of the following clusters provides consistent file system images across servers in a cluster, allowing the servers to simultaneously read and write to a single shared file system?

A.

High-Performance Clusters

B.

High-Availability Clusters

C.

Failover Cluster

D.

Storage Cluster

Full Access
Question # 22

Which of the following terms refers to the delay experienced by a system while it is serving a request?

A.

Reaction

B.

Durability

C.

Nonrepudiation

D.

Latency

Full Access
Question # 23

Which of the following terms refers to the ease with which technicians can resolve or replace failing components or systems?

A.

Reparability

B.

Recoverability

C.

Robustness

D.

Redundancy

Full Access
Question # 24

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

A.

Detailed Awareness Training

B.

Simulation Training

C.

Scenario Training

D.

Introductory Awareness Training

Full Access
Question # 25

The internal audit of the BCP takes place so as to make sure the plan conforms to which particular standard?

A.

ISO 22301:2012

B.

ISO/IEC 27005:2011

C.

ISO/IEC 27031:2011

D.

ISO 22313

Full Access
Question # 26

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

A.

Offsite Backup

B.

Cloud Backup

C.

Onsite Backup

D.

Hot Site Backup

Full Access
Question # 27

Which of the following virtualization methods requires a software called containers or virtual engines to run?

A.

Data Virtualization

B.

Network Virtualization

C.

Desktop Virtualization

D.

OS-Based Virtualization

Full Access
Question # 28

Amy was conducting a disaster recovery test at her clinic. In this test scenario, a real-life disaster was mimicked, and important aspects such as software, communication, procedures, and personnel were tested. Which test was Amy conducting?

A.

Walkthrough Testing

B.

Parallel Testing

C.

Full Interruption Testing

D.

Simulation Testing

Full Access
Question # 29

Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?

A.

Functional Test

B.

Simulation Test

C.

Checklist Test

D.

Orientation Test

Full Access
Question # 30

Which of the following is a virtualization standard specified by the Distributed Management Task Force (DMTF)?

A.

PCI Data Security Standard (PCI DSS)

B.

Cloud Security Alliance (CSA)

C.

vCloud API

D.

Open Virtualization Format (OVF)

Full Access
Question # 31

Which of the following is not an objective of business impact analysis?

A.

Assess the Impact Caused by a Threat

B.

Identify the Critical Resources Required by the Business

C.

Establish the Recovery Order of the Critical Business Functions

D.

Identify RTO and RPO for Each Process

Full Access
Question # 32

John wanted to transfer his organization’s data to an alternate site. He wanted the alternate site to run in parallel to the primary site, which would allow his organization to continue normal business operations almost immediately in the event of a disruption. Which of the following sites is best suited to John’s requirements?

A.

Cold Site

B.

Warm Site

C.

Hot Site

D.

Colocation Facilities

Full Access
Question # 33

Which of the following terms refers to a high-speed data transmission technique that provides access to consolidated block-level storage?

A.

Cloud Storage

B.

Network Attached Storage (NAS)

C.

Storage Virtualization

D.

Storage Area Network (SAN)

Full Access
Question # 34

Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?

A.

Quantitative Risk Assessment

B.

Qualitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Semi-Quantitative Risk Assessment

Full Access
Question # 35

Which of the following refers to a moveable operating environment that can be set up or installed at any place on transportable units?

A.

Mobile Recovery Center

B.

Crisis Command Center

C.

Cold Site

D.

Colocation Facilities

Full Access
Question # 36

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

A.

High-Availability

B.

Global Load Balancing

C.

Failover

D.

Network Load Balancing

Full Access
Question # 37

Which of the following services provides mail and calendar services?

A.

Application Server

B.

Web Server

C.

Exchange Server

D.

Domain Controller

Full Access
Question # 38

Jake was preparing a particular plan for his organization in which all personnel accountable for research, development, and implementation of the disaster recovery plan were being identified. Which plan was Jake preparing for his organization?

A.

Business Continuity Plan

B.

Disaster Management Plan

C.

IT Recovery Plan

D.

Disaster Recovery Plan

Full Access
Question # 39

Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:

a) Assess the potential impact of the threat on the organization

b) Estimate the probability of occurrence of each threat

c) Assess the internal and external resources available to mitigate the identified threats

d) List the threats that may occur

In which order should Jon implement these steps?

A.

c, a, d, b

B.

d, b, a, c

C.

b, d, c, a

D.

b, c, d, a

Full Access
Question # 40

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Full Access
Question # 41

Which of the following refers to a central command and control facility responsible for carrying out recovery actions, coordinating response and resources, and assuring the coherence of operations of an organization?

A.

Crisis Command Center

B.

Colocation Facilities

C.

Mobile Recovery Center

D.

Emergency Operations Center

Full Access
Question # 42

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Full Access
Question # 43

Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?

A.

Point in Time Recovery

B.

Load Balancing

C.

Clustering

D.

High-Availability

Full Access
Question # 44

Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?

A.

Cloud-based Storage

B.

Virtual Machines

C.

Software Defined Data Center

D.

Data Virtualization

Full Access
Question # 45

Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?

A.

Return on Risk Adjusted Capital (RORAC)

B.

Value at Risk

C.

Risk Adjusted Return On Capital (RAROC)

D.

Risk Valuation

Full Access