312-76 Disaster Recovery Professional Practice Test Set 1

Which of the following Tier 1 policies will identify who is responsible for what?   


Options are :

  • Topic
  • Compliance or Consequences
  • Responsibilities
  • Scope

Answer : Responsibilities

312-76 Disaster Recovery Professional Practice Test Set 7

Which of the following security procedures is NOT related to the SDLC's disposition?   


Options are :

  • Security certification
  • Media sanitation
  • Hardware and software disposal
  • Information preservation

Answer : Security certification

Which of the following processes is involved in identifying, measuring, and controlling events?   


Options are :

  • Risk Management
  • Disaster Recovery
  • Incident Management
  • Response Management

Answer : Risk Management

Which of the following contract types is described in the statement below?

"The seller is reimbursed for all allowable costs for performing the contract work, and receives a

fixed payment calculated as a percentage for the initial estimated project costs."



Options are :

  • Cost Plus Incentive Fee Contracts (CPIF)
  • Cost Plus Fixed Fee Contracts (CPFF)
  • Firm Fixed Price Contracts (FFP)
  • Fixed Price Incentive Fee Contracts (FPIF)

Answer : Cost Plus Fixed Fee Contracts (CPFF)

312-76 Disaster Recovery Professional Practice Test Set 7

Which of the following parts of BS 7799 covers risk analysis and management?   


Options are :

  • Part 2
  • Part 4
  • Part 3
  • Part 1

Answer : Part 3

Who among the following has the ultimate responsibility for the protection of the organization's information?   


Options are :

  • User
  • Application owner
  • Senior management
  • Technology provider

Answer : Senior management

Which of the following documents helps disaster recovery team members in getting the alternate sites up and running? 


Options are :

  • Technical guide
  • Executive summary
  • Department-specific plan
  • Checklist

Answer : Technical guide

312-76 Disaster Recovery Professional Practice Test Set 9

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts? 


Options are :

  • Executive summary
  • Checklists
  • Technical guides
  • Department-specific plans

Answer : Executive summary

Which of the following terms describes the determination of the effect of changes to the information system on the security of the information system? 


Options are :

  • Verification
  • Validation analysis
  • Impact analysis
  • Authentication

Answer : Impact analysis

Which of the following processes helps the organization to identify appropriate controls for reducing or eliminating risk during the risk mitigation process? 


Options are :

  • Risk Assessment
  • Risk Identification
  • Risk Transference
  • Risk Acceptance

Answer : Risk Assessment

312-76 Disaster Recovery Professional Practice Test Set 6

Which of the following is a compromise between hot and cold sites?   


Options are :

  • Warm site
  • Mobile site
  • Mutual site
  • Reciprocal site

Answer : Warm site

Which of the following functions is performed by change control?   


Options are :

  • It ensures that changes to the system are approved.
  • It tracks and approves changes to system hardware, software, ?rmware, and documentation
  • It maintains visibility of changes to the system.
  • It tracks changes to system hardware, software, ?rmware, and documentation.

Answer : It tracks and approves changes to system hardware, software, ?rmware, and documentation

Which of the following processes is required for effective business continuity and disaster-recovery planning? 


Options are :

  • Preparedness testing
  • Business impact assessment (BIA)
  • Paper testing
  • Walk-through testing

Answer : Business impact assessment (BIA)

312-76 Disaster Recovery Professional Practice Test Set 5

Which of the following processes acts as a control measure that provides some amount of protection to the assets?   


Options are :

  • Countermeasure
  • Safeguard
  • Vulnerability
  • Risk

Answer : Safeguard

Which of the following actions can be performed by using the principle of separation of duties?   


Options are :

  • Conducting background investigation
  • Reducing the opportunity for fraud
  • Developing job descriptions
  • Identifying critical positions

Answer : Reducing the opportunity for fraud

Which of the following TCB components is a hardware, firmware, and software element that implements the reference monitor concept? 


Options are :

  • Security Kernel
  • Trusted computer system
  • Security perimeter
  • Trusted path

Answer : Trusted path

312-76 Disaster Recovery Professional Practice Test Set 3

Which of the following tests activates the total disaster recovery plan?   


Options are :

  • Checklist test
  • Parallel test
  • Structured walk-through test
  • Full-interruption test

Answer : Full-interruption test

Which of the following terms best describes the presence of any potential event that causes an undesirable impact on the organization?   


Options are :

  • Threat
  • Asset
  • Vulnerability
  • Risk

Answer : Threat

Which of the following processes is used by organizations to set the risk tolerance, identify the potential risks, and prioritize the tolerance for risk?   


Options are :

  • Risk communication
  • Risk management
  • Risk analysis
  • Risk identification

Answer : Risk management

312-76 Disaster Recovery Professional Practice Test Set 5

Which of the following components in a TCB acts as the boundary that separates the TCB from the remainder of the system?   


Options are :

  • Trusted path
  • Security perimeter
  • Abstraction
  • Trusted computer system

Answer : Security perimeter

Which of the following individuals considers risk management in IT planning, budgeting, and meeting system performance requirements?   


Options are :

  • Functional manager
  • Senior manager
  • Chief information officer
  • System and information owner

Answer : Chief information officer

Which of the following scripts is included as a part of disaster recovery plan to confirm that everything is working as intended? 


Options are :

  • Recovery-plan script
  • Base-functionality script
  • Transact-SQL script
  • SQL Server Index Defrag script

Answer : Base-functionality script

312-76 Disaster Recovery Professional Practice Test Set 8

Which of the following is a category of an automated Incident detection process?   


Options are :

  • Control theory
  • Input detection
  • OODA looping
  • Catastrophe Theory

Answer : Catastrophe Theory

Which of the following values specifies the acceptable latency of data that will be recovered?   


Options are :

  • Recovery Target Objective
  • Recovery Point Objective
  • Recovery Plan Objective
  • Recovery Time Objective

Answer : Recovery Point Objective

Which of the following acts affects all public companies subject to US security laws?   


Options are :

  • Sarbanes-Oxley Act of 2002
  • Health Insurance Privacy and Accountability Act (HIPAA)
  • Gramm-Leach-Bliley Act of 1999
  • Federal Information Security Management Act

Answer : Sarbanes-Oxley Act of 2002

312-76 Disaster Recovery Professional Practice Test Set 5

Which of the following terms describes the determination of the effect of changes to the information system on the security of the information system? 


Options are :

  • Verification
  • Impact analysis
  • Authentication
  • Validation analysis

Answer : Impact analysis

In which of the following scenarios is database backup transferred to a remote site in a bulk transfer fashion? 


Options are :

  • Remote journaling
  • Emergency response
  • Remote mirroring
  • Electronic vaulting

Answer : Electronic vaulting

Which of the following types of storage requires some direct human action in order to make access to the storage media physically possible?   


Options are :

  • On-line
  • Far-line
  • Near-line
  • Off-line

Answer : Off-line

312-76 Disaster Recovery Professional Practice Test Set 9

Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry? 


Options are :

  • Need to Know
  • None
  • Segregation of duties
  • Separation of duties
  • Due care

Answer : Due care

Which of the following processes is NOT included in the risk mitigation?   


Options are :

  • Risk identi?cation
  • Risk assumption
  • Risk limitation
  • Risk planning

Answer : Risk identi?cation

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?   


Options are :

  • Emergency action team
  • Damage-assessment team
  • Emergency-management team
  • Off-site storage team

Answer : Emergency action team

Which of the following subphases are defined in the maintenance phase of the life cycle models?

Each correct answer represents a part of the solution. Choose all that apply.

A. Change control

B. Request control

C. Release control

D. Configuration control


Options are :

  • B,C,D
  • A,C,D
  • A,B,D
  • A,B,C

Answer : A,B,C

312-76 Disaster Recovery Professional Practice Test Set 9

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited

personnel in the field of security management. She is giving a tutorial on DRP. She explains that

the major goal of a disaster recovery plan is to provide an organized way to make decisions if a

disruptive event occurs and asks for the other objectives of the DRP. If you are among some of

the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

A. Guarantee the reliability of standby systems through testing and simulation.

B. Protect an organization from major computer services failure.

C. Minimize the risk to the organization from delays in providing services.

D. Maximize the decision-making required by personnel during a disaster.


Options are :

  • A,B,D
  • A,C,D
  • B,C,D
  • A,B,C

Answer : A,B,C

Which of the following cryptographic system services assures the receiver that the received message has not been altered?   


Options are :

  • Non-repudiation
  • Authentication
  • Integrity
  • Confidentiality

Answer : Integrity

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?   


Options are :

  • Occupant Emergency Plan
  • Disaster Recovery Plan
  • Cyber Incident Response Plan
  • Crisis Communication Plan

Answer : Occupant Emergency Plan

312-76 Disaster Recovery Professional Practice Test Set 7

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?   


Options are :

  • The Service Catalogue Manager
  • The IT Service Continuity Manager
  • The Supplier Manager
  • The Configuration Manager

Answer : The Supplier Manager

Which of the following defines the communication link between a Web server and Web applications?   


Options are :

  • IETF
  • CGI
  • PGP
  • IETF

Answer : CGI

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.


Options are :

  • 350
  • 100
  • 400
  • 300

Answer : 100

312-76 Disaster Recovery Professional Practice Test Set 4

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

A. The same subnet mask is used everywhere on the network.

B. They extend the IP addressing scheme.

C. IGRP is a classless routing protocol.

D. They support VLSM and discontiguous networks.


Options are :

  • B,D
  • B,C
  • C,D
  • A,B

Answer : B,D

Which of the following is the simulation of the disaster recovery plans?   


Options are :

  • Paper test
  • Walk-through test
  • Full operational test
  • Preparedness test

Answer : Full operational test

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen

months and six months already passed. Management asks Mark that how often the project team is

participating in the risk reassessment of this project. What should Mark tell management if he is

following the best practices for risk management?



Options are :

  • Project risk management is scheduled for every month in the 18-month project.
  • At every status meeting of the project team, project risk management is an agenda item.
  • Project risk management has been concluded with the project planning.
  • Project risk management happens at every milestone

Answer : At every status meeting of the project team, project risk management is an agenda item.

312-76 Disaster Recovery Professional Practice Test Set 9

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?   


Options are :

  • Eradication
  • Identification
  • Recovery
  • Containment

Answer : Eradication

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?   


Options are :

  • Structured walk-through test
  • Full-interruption test
  • Simulation test
  • Parallel test

Answer : Full-interruption test

Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily? 


Options are :

  • Warm backup site
  • Hot backup site
  • Mobile backup site
  • Cold backup site

Answer : Mobile backup site

312-76 Disaster Recovery Professional Practice Test Set 7

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?   


Options are :

  • Configuration auditing
  • Configuration control
  • Configuration status accounting
  • Configuration identification

Answer : Configuration identification

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?   


Options are :

  • Continuity Of Operations Plan
  • Contingency Plan
  • Business Continuity Plan
  • Disaster Recovery Plan

Answer : Contingency Plan

Which of the following statements about a certification authority (CA) is true?   


Options are :

  • It issues physical certificates that confirm the identity of entities.
  • It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.
  • It is a non-profit organization that sets security standards for e-commerce.
  • It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

Answer : It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

312-76 Disaster Recovery Professional Practice Test Set 13

Which of the following statements about disaster recovery plan documentation are true?

Each correct answer represents a complete solution. Choose all that apply.

A. The documentation regarding a disaster recovery plan should be stored in backup tapes.

B. The documentation regarding a disaster recovery plan should be stored in floppy disks.

C. The disaster recovery plan documentation should be stored onsite only.

D. The disaster recovery plan documentation should be stored offsite only


Options are :

  • A,B
  • B,C
  • C,D
  • A,D

Answer : A,D

Which of the following best describes the identification, analysis, and ranking of risks?   


Options are :

  • Fast tracking
  • Plan Risk management
  • Design of experiments
  • Fixed-price contract

Answer : Plan Risk management

Which of the following plans provides procedures for recovering business operations immediately following a disaster?   


Options are :

  • Continuity of operation plan
  • Business continuity plan
  • Disaster recovery plan
  • Business recovery plan

Answer : Business recovery plan

312-76 Disaster Recovery Professional Practice Test Set 9

BS 7799 is an internationally recognized ISM standard that provides high level, conceptual

recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of

the following statements are true about BS 7799?

Each correct answer represents a complete solution. Choose all that apply.

A. BS 7799 Part 3 was published in 2005, covering risk analysis and management.

B. BS 7799 Part 1 was a standard originally published as BS 7799 by the British Standards

Institute (BSI) in 1995.

C. BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.

D. BS 7799 Part 1 was adopted by ISO as ISO/IEC 27001 in November 2005.


Options are :

  • A,B,C
  • A,C,D
  • B,C,D
  • A,B,D

Answer : A,B,C

Which of the following response teams aims to foster cooperation and coordination in incident

prevention, to prompt rapid reaction to incidents, and to promote information sharing among

members and the community at large?


Options are :

  • FIRST
  • FedCIRC
  • CSIRT
  • CERT

Answer : FIRST

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?   


Options are :

  • IDEA
  • DES
  • PGP
  • AES

Answer : DES

312-76 Disaster Recovery Professional Practice Test Set 9

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?   


Options are :

  • RAID-10
  • RAID-1
  • RAID-0
  • RAID-5

Answer : RAID-1

IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity Management (BCM) in order to ensure that the required IT infrastructure and the IT service

provision are recovered within an agreed business time scales. Which of the following are the

benefits of implementing IT Service Continuity Management?

Each correct answer represents a complete solution. Choose all that apply.

A. It prioritizes the recovery of IT services by working with BCM and SLM.

B. It minimizes costs related with recovery plans using proper proactive planning and testing.

C. It confirms competence, impartiality, and performance capability of an organization that

performs audits.

D. It minimizes disruption in IT services when it follows a major interruption or disaster.


Options are :

  • A,B,C
  • B,C,D
  • A,C,D
  • A,B,D

Answer : A,B,D

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine? 



Options are :

  • Galleta
  • Access Pass View
  • FAU
  • Asterisk logger

Answer : Access Pass View

312-76 Disaster Recovery Professional Practice Test Set 9

Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?   


Options are :

  • RAID-5
  • RAID-10
  • RAID-0
  • RAID-1

Answer : RAID-10

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT

Service Management (ITSM) process. Configuration Management is used for which of the

following?

Each correct answer represents a part of the solution. Choose all that apply.

A. To verify configuration records and correct any exceptions

B. To account for all IT assets

C. To provide precise information support to other ITIL disciplines

D. To provide a solid base only for Incident and Problem Management


Options are :

  • B,C,D
  • A,C,D
  • A,B,C
  • A,B,D

Answer : A,B,C

Which of the following types of attacks occurs when an attacker successfully inserts an

intermediary software or program between two communicating hosts?


Options are :

  • Password guessing attack
  • Man-in-the-middle attack
  • Denial-of-service attack
  • Dictionary attack

Answer : Man-in-the-middle attack

312-76 Disaster Recovery Professional Practice Test Set 5

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?   


Options are :

  • Crisis Communication Plan
  • Occupant Emergency Plan
  • Disaster Recovery Plan
  • Cyber Incident Response Plan

Answer : Cyber Incident Response Plan

Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?   


Options are :

  • Emergency management team
  • Emergency action team
  • Off-site storage team
  • Damage assessment team

Answer : Damage assessment team

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?   


Options are :

  • AES
  • IDEA
  • PGP
  • DES

Answer : DES

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?   


Options are :

  • Disaster Recovery Plan
  • Contingency Plan
  • Continuity Of Operations Plan
  • Business Continuity Plan

Answer : Contingency Plan

312-76 Disaster Recovery Professional Practice Test Set 14

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen

months and six months already passed. Management asks Mark that how often the project team is

participating in the risk reassessment of this project. What should Mark tell management if he is

following the best practices for risk management?



Options are :

  • Project risk management is scheduled for every month in the 18-month project.
  • Project risk management has been concluded with the project planning.
  • Project risk management happens at every milestone
  • At every status meeting of the project team, project risk management is an agenda item.

Answer : At every status meeting of the project team, project risk management is an agenda item.

Which of the following is the duration of time and a service level within which a business process

must be restored after a disaster in order to avoid unacceptable consequences associated with a

break in business continuity?


Options are :

  • RCO
  • RTA
  • RPO
  • RTO

Answer : RTO

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?   


Options are :

  • User password policy
  • Privacy policy
  • Network security policy
  • Backup policy

Answer : Privacy policy

312-76 Disaster Recovery Professional Practice Test Set 4

Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in

implementing efficient FCIP-based business-continuity and disaster-recovery solutions?

Each correct answer represents a complete solution. Choose all that apply.

A. FCIP write acceleration

B. IVR

C. FCIP compression

D. SAN extension tuner


Options are :

  • B,C
  • C,D
  • A,D
  • A,B

Answer : B,C

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?       


Options are :

  • Communications Management Plan
  • Stakeholder management strategy
  • Risk Management Plan
  • Resource Management Plan

Answer : Communications Management Plan

Which of the following are common applications that help in replicating and protecting critical

information at the time of disaster?

Each correct answer represents a complete solution. Choose all that apply.

A. Asynchronous replication

B. Synchronous replication

C. Tape backup

D. Disk mirroring


Options are :

  • D,C,B,A
  • C,D,B,A
  • A,B,C,D
  • B,C,D,A

Answer : A,B,C,D

312-76 Disaster Recovery Professional Practice Test Set 5

Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?   


Options are :

  • Occupant Emergency Plan
  • Crisis Communication Plan
  • Cyber Incident Response Plan
  • Disaster Recovery Plan

Answer : Occupant Emergency Plan

Which of the following individuals incorporates risk assessment in training programs for the organization's personnel? 


Options are :

  • Security awareness trainer
  • Functional manager
  • Chief information officer
  • Information system security officer

Answer : Security awareness trainer

312-76 Disaster Recovery Professional Practice Test Set 13

Which of the following maturity levels of the software CMM focuses on competent people and heroics? 


Options are :

  • Defined level
  • Repeatable level
  • Defined leve
  • Initiating level

Answer : Initiating level

Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization? 


Options are :

  • Risk Acceptance
  • Risk Mitigation
  • Risk Avoidance
  • Risk Transference

Answer : Risk Mitigation

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data? 


Options are :

  • Data site
  • Cold site
  • Cold site
  • Hot site

Answer : Hot site

312-76 Disaster Recovery Professional Practice Test Set 9

Which of the following processes measures the maturity level of the security program?   


Options are :

  • Risk assessment
  • Risk mitigation
  • GAP analysis
  • Risk analysis

Answer : GAP analysis

Which of the following tests activates the total disaster recovery plan?   


Options are :

  • Checklist test
  • Parallel test
  • Structured walk-through test
  • Full-interruption test

Answer : Full-interruption test

In which of the following DRP tests does a business unit management meet to review the plan?   


Options are :

  • Simulation test
  • Parallel test
  • Full-interruption test
  • Structured walk-through test

Answer : Structured walk-through test

312-76 Disaster Recovery Professional Practice Test Set 13

Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?   


Options are :

  • System Development Life Cycle (SDLC)
  • Risk Management Life Cycle
  • Risk Management Framework
  • Capability Maturity Model (CMM)

Answer : System Development Life Cycle (SDLC)

Which of the following documents is necessary to continue the business in the event of disaster or emergency? 


Options are :

  • Vital record
  • Fiscal value
  • Recourse record
  • Legal value

Answer : Vital record

Which of the following parts of BS 7799 covers risk analysis and management?   


Options are :

  • Part 4
  • Part 3
  • Part 2
  • Part 1

Answer : Part 3

312-76 Disaster Recovery Professional Practice Test Set 7

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts? 


Options are :

  • Department-specific plans
  • Checklists
  • Technical guides
  • Executive summary

Answer : Executive summary

Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?   


Options are :

  • Risk Management Life Cycle
  • Capability Maturity Model (CMM)
  • Risk Management Framework
  • System Development Life Cycle (SDLC)

Answer : System Development Life Cycle (SDLC)

Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization? 


Options are :

  • Risk Acceptance
  • Risk Mitigation
  • Risk Transference
  • Risk Avoidance

Answer : Risk Mitigation

312-76 Disaster Recovery Professional Practice Test Set 12

In risk analysis, which of the following can be identified as a consequence of a disaster?   


Options are :

  • Loss of goodwill
  • Loss of stockholder confidence
  • Loss of competitive edge
  • Loss of operating capability

Answer : Loss of operating capability

Which of the following plans provides procedures for disseminating status reports to personnel and the public? 


Options are :

  • Disaster Recovery Plan (DRP)
  • Crisis Communication Plan (CCP)
  • Emergency Response Plan (ERP)
  • Cyber Incident Response Plan (CIRP)

Answer : Crisis Communication Plan (CCP)

Which of the following system security policies is used to address specific issues of concern to the organization?   


Options are :

  • Issue-specific policy
  • Program policy
  • System-specific policy
  • Informative policy

Answer : Issue-specific policy

312-76 Disaster Recovery Professional Practice Test Set 9

Which of the following classification schemes is considered to be of a personal nature and is intended for company use only? 


Options are :

  • Public information
  • Sensitive information
  • Confidential information
  • Private information

Answer : Private information

Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company? 


Options are :

  • Risk acceptance
  • Risk reduction
  • Risk transference
  • Risk avoidance

Answer : Risk reduction

Which of the following tests activates the total disaster recovery plan?   


Options are :

  • Parallel tes
  • Full-interruption test
  • Checklist test
  • Structured walk-through test

Answer : Full-interruption test

312-76 Disaster Recovery Professional Practice Test Set 4

Which of the following security procedures is related to the SDLC's implementation?   


Options are :

  • Risk assessment
  • Information preservation
  • Security accreditation
  • Media sanitation

Answer : Security accreditation

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions