Professional Documents
Culture Documents
Number: 312-76
Passing Score: 800
Time Limit: 120 min
File Version: 16.5
http://www.gratisexam.com/
312-76
Excellent Questions, I pass with 90% with these questions. Guys just read this only.
Exam A
QUESTION 1
Which of the following tools in Helix Windows Live is used to reveal the database password of password
protected MDB files created using Microsoft Access or with Jet Database Engine?
A. Asterisk logger
B. FAU
C. Access Pass View
D. Galleta
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 2
Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and
six months already passed. Management asks Mark that how often the project team is participating in the
risk reassessment of this project. What should Mark tell management if he is following the best practices
for risk management?
A. At every status meeting of the project team, project risk management is an agenda item.
B. Project risk management happens at every milestone.
C. Project risk management has been concluded with the project planning.
D. Project risk management is scheduled for every month in the 18-month project.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 3
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify
the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Quantitative analysis
B. Estimate activity duration
C. Risk identification
D. Qualitative analysis
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 4
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel
in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a
disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and
asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in
SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the
solution. Choose three.
A. Guarantee the reliability of standby systems through testing and simulation.
B. Protect an organization from major computer services failure.
C. Minimize the risk to the organization from delays in providing services.
D. Maximize the decision-making required by personnel during a disaster.
Explanation/Reference:
Explanation:
QUESTION 5
Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
http://www.gratisexam.com/
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 6
Which of the following response teams aims to foster cooperation and coordination in incident prevention,
to prompt rapid reaction to incidents, and to promote information sharing among members and the
community at large?
A. CERT
B. CSIRT
C. FedCIRC
D. FIRST
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 7
You are responsible for network and information security at a large hospital. It is a significant concern that
any change to any patient record can be easily traced back to the person who made that change. What is
this called?
A. Availability
B. Non repudiation
C. Confidentiality
D. Data Protection
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 8
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary
software or program between two communicating hosts?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 9
Which of the following statements best describes the difference between the role of a data owner and the
role of a data custodian?
A. The custodian makes the initial information classification assignments and the operations manager
implements the scheme.
B. The custodian implements the information classification scheme after the initial assignment by the
operations manager.
C. The data custodian implements the information classification scheme after the initial assignment by the
data owner.
D. The data owner implements the information classification scheme after the initial assignment by the
custodian.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 10
Which of the following cryptographic system services assures the receiver that the received message has
not been altered?
A. Authentication
B. Confidentiality
C. Non-repudiation
D. Integrity
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 11
Which of the following statements about disaster recovery plan documentation are true? Each correct
answer represents a complete solution. Choose all that apply.
A. The documentation regarding a disaster recovery plan should be stored in backup tapes.
B. The documentation regarding a disaster recovery plan should be stored in floppy disks.
C. The disaster recovery plan documentation should be stored onsite only.
D. The disaster recovery plan documentation should be stored offsite only.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 12
Which of the following is the duration of time and a service level within which a business process must be
restored after a disaster in order to avoid unacceptable consequences associated with a break in business
continuity?
A. RTA
B. RPO
C. RCO
D. RTO
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 13
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular
basis?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 14
Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
Explanation/Reference:
Explanation:
QUESTION 15
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer.
The company asks you to implement a RAID system to provide fault tolerance to a database. You want to
implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
A. RAID-5
B. RAID-0
C. RAID-1
D. RAID-10
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 16
Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
A. 10
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 17
Which of the following control measures are considered while creating a disaster recovery plan? Each
correct answer represents a part of the solution. Choose three.
A. Detective measures
B. Supportive measures
C. Corrective measures
D. Preventive measures
Explanation/Reference:
Explanation:
QUESTION 18
Which of the following are some of the parts of a project plan? Each correct answer represents a complete
solution. Choose all that apply.
A. Risk identification
B. Team members list
C. Risk analysis
D. Project schedule
Explanation/Reference:
Explanation:
QUESTION 19
Which of the following statements are true about classless routing protocols? Each correct answer
represents a complete solution. Choose two.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 20
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a
fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Patent
C. Utility model
D. Copyright
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 21
Availability Management deals with the day-to-day availability of services. Which of the following takes over
when a 'disaster' situation occurs?
A. Capacity Management
B. Service Level Management
C. Service Continuity Management
D. Service Reporting
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 22
IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity Management
(BCM) in order to ensure that the required IT infrastructure and the IT service provision are recovered
within an agreed business time scales. Which of the following are the benefits of implementing IT Service
Continuity Management? Each correct answer represents a complete solution. Choose all that apply.
Explanation/Reference:
Explanation:
QUESTION 23
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the
network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the Incident handling process will utilize the signature to resolve this
incident?
A. Eradication
B. Identification
C. Containment
D. Recovery
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 24
Which of the following is established during the Business Impact Analysis by the owner of a process in
accepted business continuity planning methodology?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 25
Which of the following options is an intellectual property right to protect inventions?
A. Snooping
B. Patent
C. Copyright
D. Utility model
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 26
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The
specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of
the following techniques will he use to fulfill this requirement?
A. AES
B. DES
C. IDEA
D. PGP
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 27
Which of the following is the simulation of the disaster recovery plans?
A. Walk-through test
B. Full operational test
C. Paper test
D. Preparedness test
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 28
You work as the project manager for Bluewell Inc. Your project has several risks that will affect several
stakeholder requirements. Which project management plan will define who will be available to share
information on the project risks?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 29
Which of the following levels of RAID provides security features that are availability, enhanced
performance, and fault tolerance?
A. RAID-10
B. RAID-5
C. RAID-0
D. RAID-1
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 30
Which of the following backup sites takes the longest recovery time?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 31
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate
the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on
Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in
Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis.
Which of the following is the correct order for searching data on a Windows based system?
A. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
B. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
C. Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces
D. Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 32
Which of the following defines the communication link between a Web server and Web applications?
A. IETF
B. Firewall
C. PGP
D. CGI
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 33
Which of the following plans is documented and organized for emergency response, backup operations,
and recovery maintained by an activity as part of its security program that will ensure the availability of
critical resources and facilitates the continuity of operations in an emergency situation?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 34
Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in
implementing efficient FCIP-based business-continuity and disaster-recovery solutions? Each correct
answer represents a complete solution. Choose all that apply.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 35
Which of the following methods is a means of ensuring that system changes are approved before being
implemented, and the implementation is complete and accurate?
A. Configuration identification
B. Configuration control
C. Configuration auditing
D. Documentation control
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 36
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 37
Which of the following statements about a certification authority (CA) is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 38
BS 7799 is an internationally recognized ISM standard that provides high level, conceptual
recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the
following statements are true about BS 7799?
Each correct answer represents a complete solution. Choose all that apply.
A. BS 7799 Part 3 was published in 2005, covering risk analysis and management.
B. BS 7799 Part 1 was a standard originally published as BS 7799 by the British Standards Institute (BSI)
in 1995.
C. BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.
D. BS 7799 Part 1 was adopted by ISO as ISO/IEC 27001 in November 2005.
Explanation/Reference:
Explanation:
QUESTION 39
An organization monitors the hard disks of its employees' computers from time to time. Which policy does
this pertain to?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 40
Which of the following disaster recovery tests includes the operations that shut down at the primary site,
and are shifted to the recovery site according to the disaster recovery plan?
A. Parallel test
B. Simulation test
C. Full-interruption test
D. Structured walk-through test
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 41
Fill in the blank with the appropriate phrase.
____________ privilege escalation is the process of attempting to access sources with a higher access,
such as a user account trying to access admin privileges.
A. Vertical
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 42
Choose the steps involved in the general disaster recovery procedure.
A.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 43
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery
temporarily?
A. Hot backup site
B. Cold backup site
C. Mobile backup site
D. Warm backup site
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 44
Which of the following subphases are defined in the maintenance phase of the life cycle models? Each
correct answer represents a part of the solution. Choose all that apply.
A. Change control
B. Request control
C. Release control
D. Configuration control
Explanation/Reference:
Explanation:
QUESTION 45
Fill in the blank:
An ___________________ (AS) is a group of networks under a single administration and with single
routing policies.
A. Autonomous System
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 46
Which of the following best describes the identification, analysis, and ranking of risks?
A. Fixed-price contract
B. Design of experiments
C. Fast tracking
D. Plan Risk management
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 47
Which of the following procedures is to reduce the risk to personnel, property, and other assets while
minimizing work disorders in the event of an emergency?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 48
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover
from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service
attacks, or unauthorized changes to system hardware, software, or data?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 49
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of
the time required to recover?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 50
Fill the appropriate power supply form factor in the blank space. _________form factor is similar to LPX
form factor in physical dimensions.
A. ATX
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 51
Which of the following are common applications that help in replicating and protecting critical information at
the time of disaster?
Each correct answer represents a complete solution. Choose all that apply.
A. Asynchronous replication
B. Synchronous replication
C. Tape backup
D. Disk mirroring
Explanation/Reference:
Explanation:
QUESTION 52
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service
Management (ITSM) process. Configuration Management is used for which of the following?
Each correct answer represents a part of the solution. Choose all that apply.
Explanation/Reference:
Explanation:
QUESTION 53
Which of the following plans provides procedures for recovering business operations immediately following
a disaster?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 54
Fill the measurement of SFX form factor style power supply in the blank space. The SFX form factor style
power supply is ___________mm wide, mm deep, and mm in height.
A. 100
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 55
You work as a senior project manager in SoftTech Inc. You are working on a software project using
configuration management. Through configuration management, you are decomposing the verification
system into identifiable, understandable, manageable, traceable units that are known as Configuration
Items (CIs). According to you, which of the following processes is known as the decomposition process of a
verification system into Configuration Items?
A. Configuration auditing
B. Configuration identification
C. Configuration status accounting
D. Configuration control
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 56
You are working as a project manager in your organization. You are nearing the final stages of project
execution and looking towards the final risk monitoring and controlling activities. For your project archives,
which one of the following is an output of risk monitoring and control?
http://www.gratisexam.com/
A. Risk audits
B. Qualitative risk analysis
C. Quantitative risk analysis
D. Requested changes
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 57
Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then attempting
to leverage that into access to unauthorized system resources.
A. Privilege escalation
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 58
Which of the following procedures can be broadly defined as the plan for the exchange of information
before, during, or after a crisis event?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 59
Which of the following processes identifies the threats that can impact the business continuity of
operations?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 60
Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from
occurring?
A. Corrective measures
B. Detective measures
C. Preventive measures
D. Supportive measures
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 61
Which of the following cryptographic system services ensures that the information will not be disclosed to
any unauthorized person on a local network?
A. Non-repudiation
B. Confidentiality
C. Authentication
D. Integrity
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 62
Which of the following cryptographic system services proves a user's identity?
A. Confidentiality
B. Non-repudiation
C. Integrity
D. Authentication
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 63
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents
regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the
Incident handling process?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 64
Which methodology is a method to analyze the involved tasks in completing a given project, especially the
time needed to complete each task, and identifying the minimum time needed to complete the total project?
A. CPM
B. Gantt
C. PERT
D. FP
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 65
Which of the following RAID levels provides fault tolerance?
A. RAID-5
B. RAID-1
C. RAID-10
D. RAID-0
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 66
You are the project manager for a construction project. The project involves casting of a column in a very
narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be
required for casting that column. You decide to hire a local expert team for casting that column. Which of
the following types of risk response are you following?
A. Transference
B. Mitigation
C. Avoidance
D. Acceptance
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 67
Which of the following options is an activity of observing the content that appears on a computer monitor or
watching what a user is typing?
A. Utility model
B. Copyright
C. Snooping
D. Patent
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 68
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is
created to prevent interruptions to normal business activity?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 69
Which of the following elements of BCP process includes the areas of plan implementation, plan testing,
and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 70
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him
to investigate a computer, which is used by the suspect to sexually harass the victim using instant
messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover
password from instant messenger program, which suspect is using, to collect the evidence of the crime.
Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish
the task?
A. MessenPass
B. Mail Pass View
C. Asterisk Logger
D. Access PassView
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 71
Which of the following should the administrator ensure during the test of a disaster recovery plan?
A. Ensure that all client computers in the organization are shut down.
B. Ensure that each member of the disaster recovery team is aware of their responsibility.
C. Ensure that the plan works properly
D. Ensure that all the servers in the organization are shut down.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 72
Which of the following governance bodies provides management, operational, and technical controls to
satisfy the security requirements?
Explanation/Reference:
Explanation:
QUESTION 73
Against which of the following does SSH provide protection? Each correct answer represents a complete
solution. Choose two.
A. Broadcast storm
B. Password sniffing
C. DoS attack
D. IP spoofing
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 74
A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following
are the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
A. Risk identification
B. Project schedule
C. Risk analysis
D. Team members list
E. Security Threat
Explanation/Reference:
Explanation:
QUESTION 75
Which of the following statements is related to residual risks?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 76
You work as a project manager for BlueWell Inc. You are working with your team members on the risk
responses in the project. Which risk response will likely cause a project to use the procurement processes?
A. Mitigation
B. Sharing
C. Exploiting
D. Acceptance
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 77
You want to use PGP files for steganography. Which of the following tools will you use to accomplish the
task?
A. Snow
B. ImageHide
C. Blindside
D. Stealth
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 78
Fill in the blank:
A ___________plan is a plan devised for a specific situation when things could go wrong.
A. contingency
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 79
You are working as a Project Manager in your organization. You are nearing the final stages of project
execution, and looking towards the final risk monitoring and controlling activities. For your project archives,
which one of the following is an output of risk monitoring and control?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 80
Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop
software. Which SDLC phase meets the following audit objectives? System and data are validated.
System meets all user requirements.
System meets all control requirements.
A. Definition
B. Evaluation and acceptance
C. Initiation
D. Programming and training
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 81
Mark works as a Network Administrator for NetTech Inc. Mark is testing the disaster recovery plan of the
company. During the testing of the recovery plan, he finds that some servers have been restored with
another server's data. What will Mark do to improve the disaster recovery plan?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 82
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit.
John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Explanation/Reference:
Explanation:
QUESTION 83
Which of the following backup sites is a replica of the original site of an organization with full computer
systems as well as near-complete backups of user data?
Explanation/Reference:
Explanation:
QUESTION 84
Organizations must assess the safety of their workplaces and consider the ability of a business to continue
despite risk impact. When assessing business continuity risks, the HR Professional must consider several
different types of disasters, their probability, and impact on an organization. What category of disaster is
best described as acts of terrorism, major thefts, sabotage, or labor disputes?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 85
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.
A. netstat
B. whois
C. cab extractors
D. ipconfig
Explanation/Reference:
Explanation:
QUESTION 86
Which of the following authorizes and documents all the changes in the IT Infrastructure and its
components (Configuration Items) in order to maintain a minimum amount of interruptive effects upon the
running operation?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 87
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional
computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon
attempts allowed before a user account is locked out. What will you do to accomplish the task?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 88
Which of the following techniques is an encryption method that uses public-key encryption to encrypt and
digitally sign e-mail messages during communication between e-mail clients?
A. DES
B. IDEA
C. PGP
D. AES
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 89
Drag and drop the appropriate team names in front of their respective responsibilities.
A.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 90
Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data
from a disaster?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 91
Which of the following BCP teams deals with the key decision making and guides recovery teams and
business personnel?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 92
Which of the following procedures is designed to contain data, hardware, and software that can be critical
for a business?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 93
You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery
for your project. Which of the following steps are performed by you for secure recovery based on the extent
of the disaster and the organization's recovery ability? Each correct answer represents a part of the
solution. Choose three.
Explanation/Reference:
Explanation:
QUESTION 94
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In which of the
following disaster recovery tests can this task be performed?
A. Parallel test
B. Full-interruption test
C. Structured walk-through test
D. Simulation test
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 95
Which of the following plans is designed to protect critical business processes from natural or man-made
failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
A. Contingency plan
B. Disaster recovery plan
C. Crisis communication plan
D. Business continuity plan
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 96
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 97
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries at
the time of disaster recovery?
A. Applications team
B. Software team
C. Emergency management team
D. Off-site storage team
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 98
Fill in the blank with an appropriate phrase.
The ___________ is concerned with rebuilding production processing and determining the criticality of data.
A. recovery team
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 99
Which of the following policies is related to the backup of data?
A. Backup policy
B. Network security policy
C. User password policy
D. Privacy policy
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 100
Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical
computer systems that are necessary to support business continuity. All these tiers provide a simple
method to define current service levels and associated risks. Choose and re-order the tiers of disaster
recovery plan.
A.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 101
ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a
comprehensive information security infrastructure and the second part is an auditing guide based on
requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the
ISO 17799 domains?
Each correct answer represents a complete solution. Choose all that apply.
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
QUESTION 102
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your
enterprise. The networking, to be done in the new extension, requires different types of cables and an
appropriate policy that will be decided by you. Which of the following stages in the Incident handling process
involves your decision making?
A. Containment
B. Preparation
C. Identification
D. Eradication
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 103
A Web-based credit card company had collected financial and personal details of Mark before issuing him a
credit card. The company has now provided Mark's financial and personal details to another company.
Which of the following Internet laws has the credit card issuing company violated?
A. Security law
B. Privacy law
C. Trademark law
D. Copyright law
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 104
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in
the time of disaster recovery?
A. Emergency-management team
B. Off-site storage team
C. Software team
D. Applications team
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 105
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
A. Privacy
B. Availability
C. Integrity
D. Confidentiality
QUESTION 106
Which of the following ensures that the confidentiality, integrity, and availability of the services are
maintained to the levels approved on the Service Level Agreement (SLA)?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 107
You are analyzing accounting information of a company. Which of the following components of
configuration management should you use that involves periodic checks to determine the consistency and
completeness of accounting information, and to verify that all configuration management policies are being
followed?
A. Configuration auditing
B. Configuration identification
C. Configuration control
D. Configuration status accounting
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 108
Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?
A. Detective measures
B. Corrective measures
C. Supportive measures
D. Preventive measures
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 109
Which of the following stages of the business continuity planning life cycle focuses on the execution and
testing of the individual solution designs developed?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 110
Which of the following types of agreement can be a legally binding formal or informal "contract"?
A. Non-disclosure agreement
B. Consulting agreement
C. Cooperative agreement
D. Service level agreement
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 111
Which of the following tests ensures that the organization complies with the requirements of the disaster
recovery plan?
A. Parallel test
B. Checklist test
C. Simulation test
D. Full-interruption test
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 112
Which of the following contract types is described in the statement below? "The seller is reimbursed for all
allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage
for the initial estimated project costs."
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 113
Which of the following processes is required for effective business continuity and disaster- recovery
planning?
A. Walk-through testing
B. Paper testing
C. Business impact assessment (BIA)
D. Preparedness testing
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 114
Which of the following parts of BS 7799 covers risk analysis and management?
A. Part 2
B. Part 4
C. Part 1
D. Part 3
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 115
Which of the following tests activates the total disaster recovery plan?
A. Full-interruption test
B. Structured walk-through test
C. Checklist test
D. Parallel test
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 116
Which of the following documents helps disaster recovery team members in getting the alternate sites up
and running?
A. Technical guide
B. Executive summary
C. Department-specific plan
D. Checklist
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 117
Which of the following documents is necessary to continue the business in the event of disaster or
emergency?
A. Vital record
B. Recourse record
C. Legal value
D. Fiscal value
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 118
Which of the following scripts is included as a part of disaster recovery plan to confirm that everything is
working as intended?
A. Base-functionality script
B. Recovery-plan script
C. SQL Server Index Defrag script
D. Transact-SQL script
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 119
Which of the following documents provides a high-level view of the entire organization's disaster recovery
efforts?
A. Checklists
B. Technical guides
C. Executive summary
D. Department-specific plans
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 120
Which of the following processes helps to quantify the impact of potential threats to put a price or value on
the cost of lost business functionality?
A. Risk Identification
B. Risk Analysis
C. Risk Reassessment
D. Risk Avoidance
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 121
Which of the following administrative policy controls requires individuals or organizations to be engaged in
good business practices relative to the organization's industry?
A. Separation of duties
B. Need to Know
C. Segregation of duties
D. Due care
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 122
Which of the following processes is involved in identifying, measuring, and controlling events?
A. Incident Management
B. Response Management
C. Disaster Recovery
D. Risk Management
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 123
Which of the following acts affects all public companies subject to US security laws?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 124
Which of the following acts of information security governance affects the financial institutions?
Explanation/Reference:
Explanation:
QUESTION 125
Which of the following modes of operation supports users with different clearances and data at various
classification levels?
A. Dedicated
B. Limited Access
C. Compartmented
D. Multilevel mode
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 126
Which of the following processes acts as a control measure that provides some amount of protection to the
assets?
A. Risk
B. Countermeasure
C. Vulnerability
D. Safeguard
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 127
In which of the following prototyping, a version of the system is built to check the requirements and is then
discarded?
A. Evolutionary prototyping
B. Incremental prototyping
C. Project prototyping
D. Throw-away prototyping
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 128
In which of the following prototyping, a prototype of a system is built and then evolves into the final system?
A. Project prototyping
B. Evolutionary prototyping
C. Throw-away prototyping
D. Incremental prototyping
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 129
Which of the following terms best describes the presence of any potential event that causes an undesirable
impact on the organization?
A. Threat
B. Risk
C. Vulnerability
D. Asset
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 130
Which of the following DRP tests is plan distributed, and reviewed by the business units for its
thoroughness and effectiveness?
A. Functional drill
B. Parallel test
C. Walk-through drill
D. Checklist review
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 131
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
A. PA09
B. PA07
C. PA06
D. PA10
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 132
Which of the following provides a means of predicting the outcome of the next software project conducted
by an organization?
A. Software process capability
B. Software process maturity
C. Software process performance
D. Software security engineering
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 133
Which of the following SSE-CMM security engineering Process Areas (PA) provides the security input?
A. PA06
B. PA09
C. PA07
D. PA08
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 134
Which of the following terms describes the determination of the effect of changes to the information system
on the security of the information system?
A. Verification
B. Authentication
C. Impact analysis
D. Validation analysis
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 135
Which of the following processes helps the organization to identify appropriate controls for reducing or
eliminating risk during the risk mitigation process?
A. Risk Assessment
B. Risk Acceptance
C. Risk Transference
D. Risk Identification
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 136
Which of the following components in a TCB acts as the boundary that separates the TCB from the
remainder of the system?
A. Abstraction
B. Trusted path
C. Trusted computer system
D. Security perimeter
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 137
Which of the following TCB components is a hardware, firmware, and software element that implements
the reference monitor concept?
A. Security perimeter
B. Security Kernel
C. Trusted computer system
D. Trusted path
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 138
Which of the following terms describes the annually expected financial loss to an organization from a
threat?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 139
Which of the following processes is NOT included in the risk mitigation?
A. Risk planning
B. Risk limitation
C. Risk identi?cation
D. Risk assumption
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 140
Which of the following processes is used by organizations to set the risk tolerance, identify the potential
risks, and prioritize the tolerance for risk?
A. Risk communication
B. Risk identification
C. Risk management
D. Risk analysis
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 141
Which of the following security procedures is related to the SDLC's implementation?
A. Risk assessment
B. Media sanitation
C. Security accreditation
D. Information preservation
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 142
Which of the following security procedures is NOT related to the SDLC's disposition?
A. Media sanitation
B. Information preservation
C. Hardware and software disposal
D. Security certification
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 143
Which of the following terms describes the determination of the effect of changes to the information system
on the security of the information system?
A. Validation analysis
B. Impact analysis
C. Authentication
D. Verification
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 144
Which of the following individuals considers risk management in IT planning, budgeting, and meeting
system performance requirements?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 145
Which of the following values must ensure that the Maximum Tolerable Period of Disruption (MTPD) for
each activity is not exceeded?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 146
Which of the following values specifies the acceptable latency of data that will be recovered?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 147
Which of the following events occurs in a system when there is a TCB failure and the recovery procedures
cannot return the system to a secure state?
A. Fault tolerance
B. Cold start
C. Fail-over
D. Fail-soft
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 148
In which of the following scenarios is database backup transferred to a remote site in a bulk transfer
fashion?
A. Remote journaling
B. Emergency response
C. Remote mirroring
D. Electronic vaulting
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 149
Which of the following sites is a non-mainstream alternative to a traditional recovery site?
A. Warm site
B. Hot site
C. Mobile site
D. Cold site
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 150
Which of the following is a compromise between hot and cold sites?
A. Mutual site
B. Warm site
C. Mobile site
D. Reciprocal site
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 151
Which of the following types of storage requires some direct human action in order to make access to the
storage media physically possible?
A. Near-line
B. Off-line
C. On-line
D. Far-line
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 152
Which of the following steps has the goal to reduce the level of risk to the IT system and its data to an
acceptable level?
A. Recommended Controls
B. Results Documentation
C. Impact Analysis
D. Risk Determination
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 153
Who among the following has the ultimate responsibility for the protection of the organization's information?
A. Senior management
B. Application owner
C. User
D. Technology provider
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 154
Which of the following Tier 1 policies will identify who is responsible for what?
A. Scope
B. Responsibilities
C. Compliance or Consequences
D. Topic
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 155
Which of the following global (Tier 1) policies de?nes what speci?cally the policy is going to address?
A. Responsibilities
B. Scope
C. Compliance or Consequences
D. Topic
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 156
Which of the following tasks is prioritized the most by the information security strategy?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 157
Which of the following actions can be performed by using the principle of separation of duties?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 158
Which of the following functions is performed by change control?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 159
Which of the following is a category of an automated Incident detection process?
A. Catastrophe Theory
B. Input detection
C. Control theory
D. OODA looping
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 160
Which of the following workforces works to handle the incidents in an enterprise?
A. Z force
B. IEEE Software Development Team
C. Computer Emergency Response Team
D. Computer Forensics Team
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 161
Which of the following sets of incident response practices is recommended by the CERT/CC?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 162
Which of the following processes helps the business units to understand the impact of a disruptive event?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 163
Which of the following is the phase of Incident handling process in which the distinction between an event
and an incident is made?
A. Identification phase
B. Preparation phase
C. Differential phase
D. Eradication phase
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 164
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
A. Industry averages
B. Tape restore data
C. Business impact analysis
D. Past recovery test results
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 165
Which of the following processes hides one set of IP addresses used for internal traffic only while exposing
a second set of addresses to external traffic?
A. SIIT
B. NAT
C. NAT-PT
D. NAPT-PT
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 166
Which of the following types of controls focuses on stopping a security breach from taking place in the ?rst
place?
A. Detection
B. Containment
C. Preventive
D. Recovery
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 167
Which of the following types of control gives an instance of the audit log?
A. Preventive
B. Detection
C. Containment
D. Recovery
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 168
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log
files, and triggering alarms?
A. Behavior-based ID system
B. Network-based ID system
C. Signature-Based ID system
D. Host-based ID system
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 169
Which of the following systems commonly resides on a discrete network segment and monitors the traffic
on that network segment?
A. Host-Based ID system
B. Statistical Anomaly-Based ID system
C. Signature-Based ID system
D. Network-Based ID system
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 170
Which of the following systems helps to detect the "abuse of privileges" attack that does not actually involve
exploiting any security vulnerability?
A. Signature-Based ID system
B. Network-Based ID system
C. Statistical Anomaly-Based ID system
D. Host-Based ID system
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 171
A Web-based credit card company had collected financial and personal details of Mark before issuing him a
credit card. The company has now provided Mark's financial and personal details to another company.
Which of the following Internet laws has the credit card issuing company violated?
A. Security law
B. Privacy law
C. Trademark law
D. Copyright law
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 172
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify
the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Qualitative analysis
B. Estimate activity duration
C. Quantitative analysis
D. Risk identification
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 173
You are working as a project manager in your organization. You are nearing the final stages of project
execution and looking towards the final risk monitoring and controlling activities. For your project archives,
which one of the following is an output of risk monitoring and control?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 174
Fill in the blank:
An______(AS) is a group of networks under a single administration and with single routing policies.
A. Autonomous System
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 175
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In which of the
following disaster recovery tests can this task be performed?
A. Simulation test
B. Parallel test
C. Full-interruption test
D. Structured walk-through test
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 176
Mark works as a Network Administrator for NetTech Inc. Mark is testing the disaster recovery plan of the
company. During the testing of the recovery plan, he finds that some servers have been restored with
another server's data. What will Mark do to improve the disaster recovery plan?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 177
Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from
occurring?
A. Detective measures
B. Corrective measures
C. Supportive measures
D. Preventive measures
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 178
Fill in the blank:
A______plan is a plan devised for a specific situation when things could go wrong.
A. contingency
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 179
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in
the time of disaster recovery?
A. Software team
B. Off-site storage team
C. Emergency-management team
D. Applications team
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 180
Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 181
Which of the following sub-processes of IT Service Continuity Management is used to make sure that all
members of IT staff with responsibilities for fighting disasters are aware of their exactduties?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 182
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The
specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of
the following techniques will he use to fulfill this requirement?
A. IDEA
B. PGP
C. DES
D. AES
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 183
Which of the following cryptographic system services assures the receiver that the received message has
not been altered?
A. Authentication
B. Non-repudiation
C. Confidentiality
D. Integrity
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 184
Fill in the blank with the appropriate number:
RAID-______is a combination of RAID-1 and RAID-0.
A. 10
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 185
Which of the following statements about a certification authority (CA) is true?
A. It is a business-to-consumer (B2C) commerce model that is used for high-volume transacti ons.
B. It is a non-profit organization that sets security standards for e-commerce.
C. It issues physical certificates that confirm the identity of entities.
D. It is a trusted third-party organization that issues digital certificates to create digital signatures and public
key pairs.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 186
Which of the following are some of the parts of a project plan? Each correct answer represents a complete
solution. Choose all that apply.
A. Risk identification
B. Project schedule
C. Risk analysis
D. Team members list
Explanation/Reference:
Explanation:
QUESTION 187
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional
computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon
attempts allowed before a user account is locked out. What will you do to accomplish the task?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
QUESTION 188
Which of the following is prepared by the business and serves as a starting point for producing the IT
Service Continuity Strategy?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 189
Which of the following options is an activity of observing the content that appears on a computer monitor or
watching what a user is typing?
A. Utility model
B. Patent
C. Snooping
D. Copyright
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 190
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer.
The company asks you to implement a RAID system to provide fault tolerance to a database. You want to
implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
A. RAID-0
B. RAID-1
C. RAID-5
D. RAID-10
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 191
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is
created to prevent interruptions to normal business activity?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 192
Which of the following statements best describes the difference between the role of a data owner and the
role of a data custodian?
A. The custodian implements the information classification scheme after the initial assignment by the
operations manager.
B. The data owner implements the information classification scheme after the initial assignment by the
custodian.
C. The data custodian implements the information classification scheme after the initial assignment by the
data owner.
D. The custodian makes the initial information classification assignments and the operations manager
implements the scheme.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 193
Which of the following statements about disaster recovery plan documentation are true? Each correct
answer represents a complete solution. Choose all that apply.
A. The documentation regarding a disaster recovery plan should be stored in backup tapes.
B. The disaster recovery plan documentation should be stored offsite only.
C. The documentation regarding a disaster recovery plan should be stored in floppy disks.
D. The disaster recovery plan documentation should be stored onsite only.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 194
Which of the following plans provides procedures for recovering business operations immediately following
a disaster?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 195
Which of the following cryptographic system services ensures that the information will not be disclosed to
any unauthorized person on a local network?
A. Non-repudiation
B. Confidentiality
C. Integrity
D. Authentication
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 196
You work as a senior project manager in SoftTech Inc. You are working on a software project using
configuration management. Through configuration management, you are decomposing the verification
system into identifiable, understandable, manageable, traceable units that are known as Configuration
Items (CIs). According to you, which of the following processes is known as the
decomposition process of a verification system into Configuration Items?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 197
Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop
software. Which SDLC phase meets the following audit objectives? l System and data are validated. l
System meets all user requirements.
l System meets all control requirements.
A. Definition
B. Initiation
C. Programming and training
D. Evaluation and acceptance
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 198
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit.
John's password is vulnerable to which of the following password cracking attacks? Each correct answer
represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Brute Force attack
C. Rule based attack
D. Hybrid attack
Explanation/Reference:
Explanation:
QUESTION 199
Fill the measurement of SFX form factor style power supply in the blank space. The SFX form factor style
power supply is______mm wide, ______mm deep, and______ mm in height.
A. 100,125,63.5
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 200
Which of the following techniques is an encryption method that uses public-key encryption to encrypt and
digitally sign e-mail messages during communication between e-mail clients?
A. PGP
B. AES
C. IDEA
D. DES
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 201
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel
in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a
disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and
asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in
SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the
solution. Choose three.
Explanation/Reference:
Explanation:
QUESTION 202
You work as a project manager for BlueWell Inc. You are working with your team members on the risk
responses in the project. Which risk response will likely cause a project to use the procurement processes?
A. Sharing
B. Acceptance
C. Exploiting
D. Mitigation
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 203
You are responsible for network and information security at a large hospital. It is a significant concern that
any change to any patient record can be easily traced back to the person who made that change. What is
this called?
A. Non repudiation
B. Data Protection
C. Availability
D. Confidentiality
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 204
Which of the following should the administrator ensure during the test of a disaster recovery plan?
A. Ensure that each member of the disaster recovery team is aware of their responsibility.
B. Ensure that all the servers in the organization are shut down.
C. Ensure that the plan works properly
D. Ensure that all client computers in the organization are shut down.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 205
Which of the following statements are true about classless routing protocols? Each correct answer
represents a complete solution. Choose two.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 206
Which of the following methods is a means of ensuring that system changes are approved before being
implemented, and the implementation is complete and accurate?
A. Configuration identification
B. Documentation control
C. Configuration auditing
D. Configuration control
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 207
Which of the following best describes the identification, analysis, and ranking of risks?
A. Design of experiments
B. Fast tracking
C. Fixed-price contract
D. Plan Risk management
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 208
Which of the following statements are true about security risks? Each correct answer represents a
complete solution. Choose three.
A. They can be mitigated by reviewing and taking responsible actions based on possible risks.
B. They can be analyzed and measured by the risk analysis process.
C. They are considered an indicator of threats coupled with vulnerability.
D. They can be removed completely by taking proper actions.
Explanation/Reference:
Explanation:
QUESTION 209
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a
fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Utility model
C. Copyright
D. Patent
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 210
Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?
A. Preventive measures
B. Detective measures
C. Supportive measures
D. Corrective measures
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 211
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is
created to prevent interruptions to normal business activity?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 212
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents
regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the
Incident handling process?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 213
Which of the following statements is related to residual risks?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 214
Which of the following procedures is to reduce the risk to personnel, property, and other assets while
minimizing work disorders in the event of an emergency?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 215
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover
from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service
attacks, or unauthorized changes to system hardware, software, or data?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 216
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of
the time required to recover?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 217
Fill the appropriate power supply form factor in the blank space. _________form factor is similar to LPX
form factor in physical dimensions.
A. ATX
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 218
Which of the following are common applications that help in replicating and protecting critical information at
the time of disaster?
Each correct answer represents a complete solution. Choose all that apply.
A. Asynchronous replication
B. Synchronous replication
C. Tape backup
D. Disk mirroring
Explanation/Reference:
Explanation:
QUESTION 219
Which of the following tests activates the total disaster recovery plan?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 220
Which of the following documents provides a high-level view of the entire organization's disaster recovery
efforts?
A. Technical guides
B. Executive summary
C. Checklists
D. Department-specific plans
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 221
Which of the following documents is necessary to continue the business in the event of disaster or
emergency?
A. Legal value
B. Recourse record
C. Fiscal value
D. Vital record
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 222
Which of the following processes helps to quantify the impact of potential threats to put a price or value on
the cost of lost business functionality?
A. Risk Reassessment
B. Risk Identification
C. Risk Analysis
D. Risk Avoidance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 223
Which of the following processes involves reducing the risk until it reaches a level acceptable to an
organization?
A. Risk Mitigation
B. Risk Transference
C. Risk Avoidance
D. Risk Acceptance
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 224
Which of the following classification schemes is considered to be of a personal nature and is intended for
company use only?
A. Sensitive information
B. Private information
C. Public information
D. Confidential information
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 225
In which of the following DRP tests does a business unit management meet to review the plan?
A. Simulation test
B. Parallel test
C. Structured walk-through test
D. Full-interruption test
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 226
In risk analysis, which of the following can be identified as a consequence of a disaster?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 227
Which of the following processes involves taking measures to alter or improve the risk position of an asset
throughout the company?
A. Risk transference
B. Risk avoidance
C. Risk reduction
D. Risk acceptance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 228
Which of the following plans provides procedures for disseminating status reports to personnel and the
public?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 229
In which of the following managing styles does the manager supervise subordinates very closely and give
detail directions?
Explanation/Reference:
Explanation:
QUESTION 230
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
A. PA10
B. PA06
C. PA09
D. PA07
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 231
Which of the following TCB techniques involves viewing system components at a high level and ignoring or
segregating its specific details?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 232
Which of the following processes measures the maturity level of the security program?
A. Risk analysis
B. GAP analysis
C. Risk assessment
D. Risk mitigation
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 233
Which of the following maturity levels of the software CMM focuses on competent people and heroics?
A. Initiating level
B. Defined level
C. Managed level
D. Repeatable level
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 234
Which of the following security procedures is related to the SDLC's implementation?
A. Risk assessment
B. Security accreditation
C. Media sanitation
D. Information preservation
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 235
Which of the following individuals incorporates risk assessment in training programs for the organization's
personnel?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 236
Which of the following parts of BS 7799 covers risk analysis and management?
A. Part 4
B. Part 1
C. Part 2
D. Part 3
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 237
Which of the following activities includes initiation, development and acquisition, implementation and
installation, operational maintenance, and disposal?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 238
Which of the following is a duplicate of the original site of an organization, with fully working systems as well
as near-complete backups of user data?
A. Hot site
B. Cold site
C. Warm site
D. Data site
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 239
Which of the following system security policies is used to address specific issues of concern to the
organization?
A. Informative policy
B. System-specific policy
C. Program policy
D. Issue-specific policy
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 240
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher? Each
correct answer represents a complete solution. Choose all that apply.
A. It is a golden color extinguisher that is filled with about 9.5 gallons (approx. 39 liters) of ordinary tap
water.
B. It uses water and pressure to stifle the heat of fire.
C. It is also known as a class C fire extinguisher.
D. It should never be used on grease fires, electrical fires, or class D fires.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 241
Which of the following Tier 1 policies will identify who is responsible for what?
A. Responsibilities
B. Compliance or Consequences
C. Scope
D. Topic
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 242
Which of the following actions can be performed by using the principle of separation of duties?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 243
Which of the following phases is the first step towards creating a business continuity plan?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 244
Which of the following phases involves getting the final senior management signoff and creating enterprise-
wide awareness of the plan?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 245
Which of the following is the phase of Incident handling process in which the distinction between an event
and an incident is made?
A. Differential phase
B. Identification phase
C. Preparation phase
D. Eradication phase
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 246
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 247
Which of the following systems commonly resides on a discrete network segment and monitors the traffic
on that network segment?
A. Host-Based ID system
B. Signature-Based ID system
C. Statistical Anomaly-Based ID system
D. Network-Based ID system
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 248
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log
files, and triggering alarms?
A. Host-based ID system
B. Behavior-based ID system
C. Network-based ID system
D. Signature-Based ID system
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 249
Which of the following tests activates the total disaster recovery plan?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 250
Which of the following documents provides a high-level view of the entire organization's disaster recovery
efforts?
A. Technical guides
B. Executive summary
C. Checklists
D. Department-specific plans
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 251
Which of the following documents is necessary to continue the business in the event of disaster or
emergency?
A. Legal value
B. Recourse record
C. Fiscal value
D. Vital record
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 252
Which of the following processes helps to quantify the impact of potential threats to put a price or value on
the cost of lost business functionality?
A. Risk Reassessment
B. Risk Identification
C. Risk Analysis
D. Risk Avoidance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 253
Which of the following processes involves reducing the risk until it reaches a level acceptable to an
organization?
A. Risk Mitigation
B. Risk Transference
C. Risk Avoidance
D. Risk Acceptance
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 254
Which of the following classification schemes is considered to be of a personal nature and is intended for
company use only?
A. Sensitive information
B. Private information
C. Public information
D. Confidential information
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 255
In which of the following DRP tests does a business unit management meet to review the plan?
A. Simulation test
B. Parallel test
C. Structured walk-through test
D. Full-interruption test
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 256
In risk analysis, which of the following can be identified as a consequence of a disaster?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 257
Which of the following processes involves taking measures to alter or improve the risk position of an asset
throughout the company?
A. Risk transference
B. Risk avoidance
C. Risk reduction
D. Risk acceptance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 258
Which of the following plans provides procedures for disseminating status reports to personnel and the
public?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 259
In which of the following managing styles does the manager supervise subordinates very closely and give
detail directions?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 260
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
A. PA10
B. PA06
C. PA09
D. PA07
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 261
Which of the following TCB techniques involves viewing system components at a high level and ignoring or
segregating its specific details?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 262
Which of the following processes measures the maturity level of the security program?
A. Risk analysis
B. GAP analysis
C. Risk assessment
D. Risk mitigation
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 263
Which of the following maturity levels of the software CMM focuses on competent people and heroics?
A. Initiating level
B. Defined level
C. Managed level
D. Repeatable level
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 264
Which of the following security procedures is related to the SDLC's implementation?
A. Risk assessment
B. Security accreditation
C. Media sanitation
D. Information preservation
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 265
Which of the following individuals incorporates risk assessment in training programs for the organization's
personnel?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 266
Which of the following parts of BS 7799 covers risk analysis and management?
A. Part 4
B. Part 1
C. Part 2
D. Part 3
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 267
Which of the following activities includes initiation, development and acquisition, implementation and
installation, operational maintenance, and disposal?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 268
Which of the following is a duplicate of the original site of an organization, with fully working systems as well
as near-complete backups of user data?
A. Hot site
B. Cold site
C. Warm site
D. Data site
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 269
Which of the following system security policies is used to address specific issues of concern to the
organization?
A. Informative policy
B. System-specific policy
C. Program policy
D. Issue-specific policy
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 270
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher? Each
correct answer represents a complete solution. Choose all that apply.
A. It is a golden color extinguisher that is filled with about 9.5 gallons (approx. 39 liters) of ordinary tap
water.
B. It uses water and pressure to stifle the heat of fire.
C. It is also known as a class C fire extinguisher.
D. It should never be used on grease fires, electrical fires, or class D fires.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 271
Which of the following Tier 1 policies will identify who is responsible for what?
A. Responsibilities
B. Compliance or Consequences
C. Scope
D. Topic
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 272
Which of the following actions can be performed by using the principle of separation of duties?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 273
Which of the following phases is the first step towards creating a business continuity plan?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 274
Which of the following phases involves getting the final senior management signoff and creating enterprise-
wide awareness of the plan?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 275
Which of the following is the phase of Incident handling process in which the distinction between an event
and an incident is made?
A. Differential phase
B. Identification phase
C. Preparation phase
D. Eradication phase
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 276
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 277
Which of the following systems commonly resides on a discrete network segment and monitors the traffic
on that network segment?
A. Host-Based ID system
B. Signature-Based ID system
C. Statistical Anomaly-Based ID system
D. Network-Based ID system
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 278
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log
files, and triggering alarms?
A. Host-based ID system
B. Behavior-based ID system
C. Network-based ID system
D. Signature-Based ID system
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 279
Which of the following cryptographic system services assures the receiver that the received message has
not been altered?
A. Authentication
B. Confidentiality
C. Non-repudiation
D. Integrity
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 280
Which of the following statements about disaster recovery plan documentation are true? Each correct
answer represents a complete solution. Choose all that apply.
A. The documentation regarding a disaster recovery plan should be stored in backup tapes.
B. The documentation regarding a disaster recovery plan should be stored in floppy disks.
C. The disaster recovery plan documentation should be stored onsite only.
D. The disaster recovery plan documentation should be stored offsite only.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 281
Which of the following is the duration of time and a service level within which a business process must be
restored after a disaster in order to avoid unacceptable consequences associated with a break in business
continuity?
A. RTA
B. RPO
C. RCO
D. RTO
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 282
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular
basis?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 283
Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 284
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer.
The company asks you to implement a RAID system to provide fault tolerance to a database. You want to
implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
A. RAID-5
B. RAID-0
C. RAID-1
D. RAID-10
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 285
Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
A. 10
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 286
Which of the following control measures are considered while creating a disaster recovery plan? Each
correct answer represents a part of the solution. Choose three.
A. Detective measures
B. Supportive measures
C. Corrective measures
D. Preventive measures
Explanation/Reference:
Explanation:
QUESTION 287
Which of the following are some of the parts of a project plan? Each correct answer represents a complete
solution. Choose all that apply.
A. Risk identification
B. Team members list
C. Risk analysis
D. Project schedule
Explanation/Reference:
Explanation:
QUESTION 288
Which of the following statements are true about classless routing protocols? Each correct answer
represents a complete solution. Choose two.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 289
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a
fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Patent
C. Utility model
D. Copyright
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 290
Availability Management deals with the day-to-day availability of services. Which of the following takes over
when a 'disaster' situation occurs?
A. Capacity Management
B. Service Level Management
C. Service Continuity Management
D. Service Reporting
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/