Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EC-Council 312-76 Exam -

Free 312-76 Sample Questions:

Q: 1
Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?
A. Occupant Emergency Plan
B. Disaster Recovery Plan
C. Cyber Incident Response Plan
D. Crisis Communication Plan
Answer: A

Q: 2
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
A. Cyber Incident Response Plan
B. Crisis Communication Plan
C. Occupant Emergency Plan
D. Disaster Recovery Plan
Answer: A

Q: 3
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?
A. Emergency action team
B. Off-site storage team
C. Emergency management team
D. Damage assessment team
Answer: D

Q: 4
Fill the appropriate power supply form factor in the blank space.
_________form factor is similar to LPX form factor in physical dimensions.
Answer: A

Q: 5
Which of the following are common applications that help in replicating and protecting critical information at the time of disaster?
Each correct answer represents a complete solution. Choose all that apply.
A. Asynchronous replication
B. Synchronous replication
C. Tape backup
D. Disk mirroring
Answer: A,B,C,D

Q: 6
Which of the following tests activates the total disaster recovery plan?
A. Structured walk-through test
B. Full-interruption test
C. Parallel test
D.Checklist test
Answer: B

Q: 7
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
A. Technical guides
B. Executive summary
C. Checklists
D.Department-specific plans
Answer: B

Q: 8
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
A. Legal value
B. Recourse record
C. Fiscal value
D.Vital record
Answer: D

Q: 9
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?
A. Risk Reassessment
B. Risk Identification
C. Risk Analysis
D.Risk Avoidance
Answer: C

Q: 10
Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?
A. Risk Mitigation
B. Risk Transference
C. Risk Avoidance
D.Risk Acceptance
Answer: A

Q: 11
Which of the following classification schemes is considered to be of a personal nature and is intended for company use only?
A. Sensitive information
B. Private information
C. Public information
D.Confidential information
Answer: B

Q: 12
In which of the following DRP tests does a business unit management meet to review the plan?
A. Simulation test
B. Parallel test
C. Structured walk-through test
D.Full-interruption test
Answer: C

Q: 13
In risk analysis, which of the following can be identified as a consequence of a disaster?
A. Loss of stockholder confidence
B. Loss of competitive edge
C. Loss of operating capability
D.Loss of goodwill
Answer: C

Q: 14
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
A. Risk transference
B. Risk avoidance
C. Risk reduction
D.Risk acceptance
Answer: C

Q: 15
Which of the following plans provides procedures for disseminating status reports to personnel and the public?
A. Disaster Recovery Plan (DRP)
B. Crisis Communication Plan (CCP)
C. Emergency Response Plan (ERP)
D.Cyber Incident Response Plan (CIRP)
Answer: B

Q: 16
In which of the following managing styles does the manager supervise subordinates very closely and give detail directions?
A. The coaching style
B. The supporting style
C. The delegating style
D.The directing style
Answer: D

Q: 17
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
A. PA10
B. PA06
C. PA09
Answer: A

Q: 18
Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?
A. Trusted computer system
B. Security perimeter
C. Abstraction
D.Trusted path
Answer: C

Q: 19
Which of the following processes measures the maturity level of the security program?
A. Risk analysis
B. GAP analysis
C. Risk assessment
D.Risk mitigation
Answer: B

Q: 20
Which of the following maturity levels of the software CMM focuses on competent people and heroics?
A. Initiating level
B. Defined level
C. Managed level
D.Repeatable level
Answer: A

© 2014, All Rights Reserved