Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-76 Practice Exam with Questions & Answers | Set: 4

Questions 31

Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?

Options:
A.

Simulation Test

B.

Orientation Test

C.

Checklist Test

D.

Tabletop Test

ECCouncil 312-76 Premium Access
Questions 32

Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?

Options:
A.

Risk Management

B.

Business Impact Analysis

C.

Risk Assessment

D.

Vulnerability Assessment

Questions 33

Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?

Options:
A.

Mirroring

B.

Deduplication

C.

Failover

D.

Server Clustering

Questions 34

Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:

a) Assess the potential impact of the threat on the organization

b) Estimate the probability of occurrence of each threat

c) Assess the internal and external resources available to mitigate the identified threats

d) List the threats that may occur

In which order should Jon implement these steps?

Options:
A.

c, a, d, b

B.

d, b, a, c

C.

b, d, c, a

D.

b, c, d, a

Questions 35

Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?

Options:
A.

Team-wide BIA

B.

Organization-wide BIA

C.

Country-wide BIA

D.

Branch-wide BIA

Questions 36

The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?

Options:
A.

Merge Replication

B.

Transactional Replication

C.

SQL Server Replication

D.

Snapshot Replication

Questions 37

Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?

Options:
A.

Mirroring

B.

Virtualization

C.

Deduplication

D.

Snapshot

Questions 38

When information confidentiality increases in PASIS architecture, what else also increases as a direct result?

Options:
A.

Reaction

B.

Latency

C.

Storage Requirement

D.

Durability

Questions 39

Which of the following clusters uses mounted file systems to read and write data?

Options:
A.

Storage Cluster

B.

High-Performance Clusters

C.

Failover Cluster

D.

High-Availability Cluster

Questions 40

Oliver’s team had been working hard on a proposal for a new project. After meticulously working out the details for a month, they found out that someone had leaked their proposal to their competitor and they had lost the project. This impacted their morale hugely, and for the next two months, all the other projects progressed extremely slowly resulting in their delay. Which of the following best describes the impact that this data breach had on the organization?

Options:
A.

Semi-Qualitative Impact

B.

Qualitative Impact

C.

Quantitative Impact

D.

Industrial Impact