Eccouncil 312-76 practice test

EC-Council Disaster Recovery Professional

Last exam update: Nov 27 ,2025
Page 1 out of 20. Viewing questions 1-15 out of 290

Question 1

Which of the following tools in Helix Windows Live is used to reveal the database password of
password protected MDB files created using Microsoft Access or with Jet Database Engine?

  • A. Asterisk logger
  • B. FAU
  • C. Access Pass View
  • D. Galleta
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months
and six months already passed. Management asks Mark that how often the project team is
participating in the risk reassessment of this project. What should Mark tell management if he is
following the best practices for risk management?

  • A. At every status meeting of the project team, project risk management is an agenda item.
  • B. Project risk management happens at every milestone.
  • C. Project risk management has been concluded with the project planning.
  • D. Project risk management is scheduled for every month in the 18-month project.
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

You work as a project manager for TYU project. You are planning for risk mitigation. You need to
identify the risks that will need a more in-depth analysis. Which of the following activities will help
you in this?

  • A. Quantitative analysis
  • B. Estimate activity duration
  • C. Risk identification
  • D. Qualitative analysis
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that the
major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive
event occurs and asks for the other objectives of the DRP. If you are among some of the newly
recruited personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.

  • A. Guarantee the reliability of standby systems through testing and simulation.
  • B. Protect an organization from major computer services failure.
  • C. Minimize the risk to the organization from delays in providing services.
  • D. Maximize the decision-making required by personnel during a disaster.
Mark Question:
Answer:

A,B,C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?

  • A. Emergency management team
  • B. Damage assessment team
  • C. Off-site storage team
  • D. Emergency action team
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following response teams aims to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote information sharing among
members and the community at large?

  • A. CERT
  • B. CSIRT
  • C. FedCIRC
  • D. FIRST
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

You are responsible for network and information security at a large hospital. It is a significant concern
that any change to any patient record can be easily traced back to the person who made that change.
What is this called?

  • A. Availability
  • B. Non repudiation
  • C. Confidentiality
  • D. Data Protection
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary
software or program between two communicating hosts?

  • A. Password guessing attack
  • B. Dictionary attack
  • C. Man-in-the-middle attack
  • D. Denial-of-service attack
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following statements best describes the difference between the role of a data owner
and the role of a data custodian?

  • A. The custodian makes the initial information classification assignments and the operations manager implements the scheme.
  • B. The custodian implements the information classification scheme after the initial assignment by the operations manager.
  • C. The data custodian implements the information classification scheme after the initial assignment by the data owner.
  • D. The data owner implements the information classification scheme after the initial assignment by the custodian.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following cryptographic system services assures the receiver that the received message
has not been altered?

  • A. Authentication
  • B. Confidentiality
  • C. Non-repudiation
  • D. Integrity
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following statements about disaster recovery plan documentation are true? Each
correct answer represents a complete solution. Choose all that apply.

  • A. The documentation regarding a disaster recovery plan should be stored in backup tapes.
  • B. The documentation regarding a disaster recovery plan should be stored in floppy disks.
  • C. The disaster recovery plan documentation should be stored onsite only.
  • D. The disaster recovery plan documentation should be stored offsite only.
Mark Question:
Answer:

A,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following is the duration of time and a service level within which a business process
must be restored after a disaster in order to avoid unacceptable consequences associated with a
break in business continuity?

  • A. RTA
  • B. RPO
  • C. RCO
  • D. RTO
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following roles is responsible for the review and risk analysis of all the contracts on
regular basis?

  • A. The IT Service Continuity Manager
  • B. The Configuration Manager
  • C. The Supplier Manager
  • D. The Service Catalogue Manager
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?

  • A. Emergency action team
  • B. Emergency-management team
  • C. Damage-assessment team
  • D. Off-site storage team
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005
computer. The company asks you to implement a RAID system to provide fault tolerance to a
database. You want to implement disk mirroring. Which of the following RAID levels will you use to
accomplish the task?

  • A. RAID-5
  • B. RAID-0
  • C. RAID-1
  • D. RAID-10
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2