Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-76 Exam Dumps - ECCouncil Certified Ethical Hacker Questions and Answers

Question # 34

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Non-repudiation

Buy Now
Question # 35

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

Options:

A.

Availability

B.

Non repudiation

C.

Confidentiality

D.

Data Protection

Buy Now
Question # 36

Which of the following phases is the first step towards creating a business continuity plan?

Options:

A.

Business Impact Assessment

B.

Plan Approval and Implementation

C.

Business Continuity Plan Development

D.

Scope and Plan Initiation

Buy Now
Question # 37

Which of the following best describes the identification, analysis, and ranking of risks?

Options:

A.

Fixed-price contract

B.

Design of experiments

C.

Fast tracking

D.

Plan Risk management

Buy Now
Question # 38

Which of the following actions can be performed by using the principle of separation of duties?

Options:

A.

Conducting background investigation

B.

Developing job descriptions

C.

Reducing the opportunity for fraud

D.

Identifying critical positions

Buy Now
Question # 39

Which of the following acts affects all public companies subject to US security laws?

Options:

A.

Gramm-Leach-Bliley Act of 1999

B.

Health Insurance Privacy and Accountability Act (HIPAA)

C.

Sarbanes-Oxley Act of 2002

D.

Federal Information Security Management Act

Buy Now
Question # 40

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Setting up the initial position after an incident

B.

Organizing a solution to remove an incident

C.

Working with QA to validate security of the enterprise

D.

Building up an incident response kit

Buy Now
Question # 41

Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?

Options:

A.

Technical guides

B.

Executive summary

C.

Checklists

D.

Department-specific plans

Buy Now
Question # 42

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

Options:

A.

IDEA

B.

PGP

C.

DES

D.

AES

Buy Now
Question # 43

Which of the following actions can be performed by using the principle of separation of duties?

Options:

A.

Developing job descriptions

B.

Identifying critical positions

C.

Conducting background investigation

D.

Reducing the opportunity for fraud

Buy Now
Exam Code: 312-76
Exam Name: Disaster Recovery Professional Practice Test
Last Update: Jan 31, 2025
Questions: 290
312-76 pdf

312-76 PDF

$25.5  $84.99
312-76 Engine

312-76 Testing Engine

$28.5  $94.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$40.5  $134.99