Last Updated on September 25, 2021 by Admin 1

312-76 : EC-Council Disaster Recovery Professional : Part 06

  1. Which of the following concepts represent the three fundamental principles of information security?

    Each correct answer represents a complete solution. Choose three.

    • Privacy
    • Availability
    • Integrity
    • Confidentiality
  2. Which of the following ensures that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

    • The IT Security Manager
    • The Change Manager
    • The Service Level Manager
    • The Configuration Manager
  3. You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?

    • Configuration auditing
    • Configuration identification
    • Configuration control
    • Configuration status accounting
  4. Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?

    • Detective measures
    • Corrective measures
    • Supportive measures
    • Preventive measures
  5. Which of the following stages of the business continuity planning life cycle focuses on the execution and testing of the individual solution designs developed?

    • Testing and acceptance stage
    • Solution design stage
    • Analysis stage
    • Implementation stage
  6. Which of the following types of agreement can be a legally binding formal or informal “contract”?

    • Non-disclosure agreement
    • Consulting agreement
    • Cooperative agreement
    • Service level agreement
  7. Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?

    • Parallel test
    • Checklist test
    • Simulation test
    • Full-interruption test
  8. Which of the following contract types is described in the statement below?

    “The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs.”

    • Fixed Price Incentive Fee Contracts (FPIF)
    • Cost Plus Fixed Fee Contracts (CPFF)
    • Cost Plus Incentive Fee Contracts (CPIF)
    • Firm Fixed Price Contracts (FFP)
  9. Which of the following processes is required for effective business continuity and disaster-recovery planning?

    • Walk-through testing
    • Paper testing
    • Business impact assessment (BIA)
    • Preparedness testing
  10. Which of the following parts of BS 7799 covers risk analysis and management?

    • Part 2
    • Part 4
    • Part 1
    • Part 3
  11. Which of the following tests activates the total disaster recovery plan?

    • Full-interruption test
    • Structured walk-through test
    • Checklist test
    • Parallel test
  12. Which of the following documents helps disaster recovery team members in getting the alternate sites up and running?

    • Technical guide
    • Executive summary
    • Department-specific plan
    • Checklist
  13. Which of the following documents is necessary to continue the business in the event of disaster or emergency?

    • Vital record
    • Recourse record
    • Legal value
    • Fiscal value
  14. Which of the following scripts is included as a part of disaster recovery plan to confirm that everything is working as intended?

    • Base-functionality script
    • Recovery-plan script
    • SQL Server Index Defrag script
    • Transact-SQL script
  15. Which of the following documents provides a high-level view of the entire organization’s disaster recovery efforts?

    • Checklists
    • Technical guides
    • Executive summary
    • Department-specific plans
  16. Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

    • Risk Identification
    • Risk Analysis
    • Risk Reassessment
    • Risk Avoidance
  17. Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization’s industry?

    • Separation of duties
    • Need to Know
    • Segregation of duties
    • Due care
  18. Which of the following processes is involved in identifying, measuring, and controlling events?

    • Incident Management
    • Response Management
    • Disaster Recovery
    • Risk Management
  19. Which of the following acts affects all public companies subject to US security laws?

    • Gramm-Leach-Bliley Act of 1999
    • Health Insurance Privacy and Accountability Act (HIPAA)
    • Sarbanes-Oxley Act of 2002
    • Federal Information Security Management Act
  20. Which of the following acts of information security governance affects the financial institutions?

    • Sarbanes-Oxley Act of 2002
    • Health Insurance Privacy and Accountability Act (HIPAA)
    • California Database Security Breach Information Act
    • Gramm-Leach-Bliley Act of 1999