최신 312-76 무료덤프 - EC-COUNCIL Disaster Recovery Professional Practice Test

Which of the following security procedures is NOT related to the SDLC's disposition?

정답: A
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?

정답: B
Who among the following has the ultimate responsibility for the protection of the organization's information?

정답: A
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

정답: C
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

정답: B
Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

정답: B
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

정답: B
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

정답: A,B,C
Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.

정답: A
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

정답: A
Which of the following contract types is described in the statement below?
"The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs."

정답: A
Which of the following types of storage requires some direct human action in order to make access to the storage media physically possible?

정답: D
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

정답: C
Fill in the blank with the appropriate number:
RAID-______is a combination of RAID-1 and RAID-0.

정답: A
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?

정답: B
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server
2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

정답: C
Which of the following terms describes the determination of the effect of changes to the information system on the security of the information system?

정답: A
Which of the following cryptographic system services proves a user's identity?

정답: A
Which of the following processes helps the organization to identify appropriate controls for reducing or eliminating risk during the risk mitigation process?

정답: B

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기