[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-76 Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-76
100% Free Download! 100% Pass Guaranteed!

Question No: 31

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect#39;s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

  1. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

  2. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

  3. Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces

  4. Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces

Answer: D

Question No: 32

Which of the following defines the communication link between a Web server and Web applications?

  1. IETF

  2. Firewall

  3. PGP

  4. CGI

Answer: D

Question No: 33

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

  1. Disaster Recovery Plan

  2. Continuity Of Operations Plan

  3. Business Continuity Plan

  4. Contingency Plan

Answer: D

Question No: 34

Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?

Each correct answer represents a complete solution. Choose all that apply.

  1. FCIP write acceleration

  2. IVR

  3. FCIP compression

  4. SAN extension tuner

Answer: B,C

Question No: 35

Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?

  1. Configuration identification

  2. Configuration control

  3. Configuration auditing

  4. Documentation control

Answer: D

Question No: 36

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

  1. The IT Service Continuity Manager

  2. The Configuration Manager

  3. The Supplier Manager

  4. The Service Catalogue Manager

Answer: C

Question No: 37

Which of the following statements about a certification authority (CA) is true?

  1. It is a non-profit organization that sets security standards for e-commerce.

  2. It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.

  3. It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.

  4. It issues physical certificates that confirm the identity of entities.

Answer: C

Question No: 38

BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts.

Which of the following statements are true about BS 7799?

Each correct answer represents a complete solution. Choose all that apply.

  1. BS 7799 Part 3 was published in 2005, covering risk analysis and management.

  2. BS 7799 Part 1 was a standard originally published as BS 7799 by the British Standards

    Institute (BSI) in 1995.

  3. BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.

  4. BS 7799 Part 1 was adopted by ISO as ISO/IEC 27001 in November 2005.

Answer: A,B,C

Question No: 39

An organization monitors the hard disks of its employees#39; computers from time to time. Which policy does this pertain to?

  1. User password policy

  2. Backup policy

  3. Privacy policy

  4. Network security policy

Answer: C

Question No: 40

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

  1. Parallel test

  2. Simulation test

  3. Full-interruption test

  4. Structured walk-through test

Answer: C

100% Ensurepass Free Download!
Download Free Demo:312-76 Demo PDF
100% Ensurepass Free Guaranteed!
312-76 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.