Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-76 Exam Dumps - ECCouncil Certified Ethical Hacker Questions and Answers

Question # 4

Which of the following stages of the business continuity planning life cycle focuses on the

execution and testing of the individual solution designs developed?

Options:

A.

Testing and acceptance stage

B.

Solution design stage

C.

Analysis stage

D.

Implementation stage

Buy Now
Question # 5

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Requested changes

D.

Qualitative risk analysis

Buy Now
Question # 6

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

Options:

A.

Configuration auditing

B.

Configuration identification

C.

Configuration status accounting

D.

Configuration control

Buy Now
Question # 7

Which of the following plans provides procedures for recovering business operations immediately following a disaster?

Options:

A.

Business recovery plan

B.

Continuity of operation plan

C.

Business continuity plan

D.

Disaster recovery plan

Buy Now
Question # 8

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the

decomposition process of a verification system into Configuration Items?

Options:

A.

Configuration status accounting

B.

Configuration identification

C.

Configuration auditing

D.

Configuration control

Buy Now
Question # 9

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?

Options:

A.

Utility model

B.

Patent

C.

Snooping

D.

Copyright

Buy Now
Question # 10

Which of the following Tier 1 policies will identify who is responsible for what?

Options:

A.

Responsibilities

B.

Compliance or Consequences

C.

Scope

D.

Topic

Buy Now
Question # 11

Which of the following events occurs in a system when there is a TCB failure and the recovery

procedures cannot return the system to a secure state?

Options:

A.

Fault tolerance

B.

Cold start

C.

Fail-over

D.

Fail-soft

Buy Now
Question # 12

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is______mm wide, ______mm deep, and______

mm in height.

Options:

A.

100,125,63.5

Buy Now
Question # 13

Which of the following policies is related to the backup of data?

Options:

A.

Backup policy

B.

Network security policy

C.

User password policy

D.

Privacy policy

Buy Now
Exam Code: 312-76
Exam Name: Disaster Recovery Professional Practice Test
Last Update: Jan 31, 2025
Questions: 290
312-76 pdf

312-76 PDF

$25.5  $84.99
312-76 Engine

312-76 Testing Engine

$28.5  $94.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$40.5  $134.99