New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-76 Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?

Options:
A.

Separation of duties

B.

Need to Know

C.

Segregation of duties

D.

Due care

ECCouncil 312-76 Premium Access
Questions 52

Which of the following global (Tier 1) policies de?nes what speci?cally the policy is going to

address?

Options:
A.

Responsibilities

B.

Scope

C.

Compliance or Consequences

D.

Topic

Questions 53

Which of the following should the administrator ensure during the test of a disaster recovery plan?

Options:
A.

Ensure that all client computers in the organization are shut down.

B.

Ensure that each member of the disaster recovery team is aware of their responsibility.

C.

Ensure that the plan works properly

D.

Ensure that all the servers in the organization are shut down.

Questions 54

Which of the following contract types is described in the statement below?

"The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs."

Options:
A.

Fixed Price Incentive Fee Contracts (FPIF)

B.

Cost Plus Fixed Fee Contracts (CPFF)

C.

Cost Plus Incentive Fee Contracts (CPIF)

D.

Firm Fixed Price Contracts (FFP)

Questions 55

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

Options:
A.

Identification phase

B.

Preparation phase

C.

Differential phase

D.

Eradication phase

Questions 56

You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?

Options:
A.

Availability

B.

Non repudiation

C.

Confidentiality

D.

Data Protection

Questions 57

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

Options:
A.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

B.

They can be analyzed and measured by the risk analysis process.

C.

They are considered an indicator of threats coupled with vulnerability.

D.

They can be removed completely by taking proper actions.

Questions 58

Which of the following stages of the business continuity planning life cycle focuses on the

execution and testing of the individual solution designs developed?

Options:
A.

Testing and acceptance stage

B.

Solution design stage

C.

Analysis stage

D.

Implementation stage

Questions 59

Which of the following security procedures is related to the SDLC's implementation?

Options:
A.

Risk assessment

B.

Security accreditation

C.

Media sanitation

D.

Information preservation

Questions 60

Which of the following parts of BS 7799 covers risk analysis and management?

Options:
A.

Part 4

B.

Part 1

C.

Part 2

D.

Part 3