[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-76 Dumps with VCE and PDF 191-200

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-76
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-76.html

Question No: 191

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

  1. Continuity of Operations Plan

  2. Disaster Recovery Plan

  3. Business Continuity Plan

  4. Contingency Plan

Answer: C

Question No: 192

Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?

  1. The custodian implements the information classification scheme after the initial assignment by the operations manager.

  2. The data owner implements the information classification scheme after the initial assignment by the custodian.

  3. The data custodian implements the information classification scheme after the initial assignment by the data owner.

  4. The custodian makes the initial information classification assignments and the operations manager implements the scheme.

Answer: C

Question No: 193

Which of the following statements about disaster recovery plan documentation are true? Each correct answer represents a complete solution. Choose all that apply.

  1. The documentation regarding a disaster recovery plan should be stored in backup tapes.

  2. The disaster recovery plan documentation should be stored offsite only.

  3. The documentation regarding a disaster recovery plan should be stored in floppy disks.

  4. The disaster recovery plan documentation should be stored onsite only.

Answer: A,B

Question No: 194

Which of the following plans provides procedures for recovering business operations immediately following a disaster?

  1. Business recovery plan

  2. Continuity of operation plan

  3. Business continuity plan

  4. Disaster recovery plan

Answer: A

Question No: 195

Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

  1. Non-repudiation

  2. Confidentiality

  3. Integrity

  4. Authentication

Answer: B

Question No: 196

You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the

decomposition process of a verification system into Configuration Items?

  1. Configuration status accounting

  2. Configuration identification

  3. Configuration auditing

  4. Configuration control

Answer: B

Question No: 197

Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives? l System and data are validated. l System meets all user requirements.

l System meets all control requirements.

  1. Definition

  2. Initiation

  3. Programming and training

  4. Evaluation and acceptance

    Answer: D

    Question No: 198

    John, a novice web user, makes a new e-mail account and keeps his password as quot;applequot;, his favorite fruit. John#39;s password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

    1. Dictionary attack

    2. Brute Force attack

    3. Rule based attack

    4. Hybrid attack

Answer: A,B,D

Question No: 199

Fill the measurement of SFX form factor style power supply in the blank space.

The SFX form factor style power supply is mm wide, mm deep, and

mm in height.

A. 100,125,63.5

Answer: A

Question No: 200

Which of the following techniques is an encryption method that uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

  1. PGP

  2. AES

  3. IDEA

  4. DES

Answer: D

100% Ensurepass Free Download!
Download Free Demo:312-76 Demo PDF
100% Ensurepass Free Guaranteed!
312-76 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.