최신 312-76 무료덤프 - EC-COUNCIL EC-Council Disaster Recovery Professional (EDRP)
Which of the following backup sites takes the longest recovery time?
정답: A
Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?
정답: B
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?
정답: C
Which of the following Tier 1 policies will identify who is responsible for what?
정답: D
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?
정답: B
Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?
정답: D
In which of the following prototyping, a prototype of a system is built and then evolves into the final system?
정답: C
Which of the following options is an intellectual property right to protect inventions?
정답: D
Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?
정답: B
Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.
__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.
정답:
Privilege escalation
Which of the following parts of BS 7799 covers risk analysis and management?
정답: D
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
정답: C