312-76 Disaster Recovery Professional Practice Exam

Table of Contents
Description
Pattern Questions:
Which of the next management measures are thought-about whereas making a catastrophe restoration plan? Every appropriate reply represents part of the answer. Select three.
Detective measures
Supportive measures
Corrective measures
Preventive measures
Which of the next are among the components of a challenge plan? Every appropriate reply represents a whole resolution. Select all that apply.
Danger identification
Group members record
Danger evaluation
Venture schedule
Which of the next statements are true about classless routing protocols? Every appropriate reply represents a whole resolution. Select two The identical subnet masks is used in all places on the community.
They prolong the IP addressing scheme.
IGRP is a classless routing protocol.
They help VLSM and discontinuous networks.
Which of the next is a set of unique rights granted by a state to an inventor or his assignee for a set time period in change for the disclosure of an invention?
Snooping
Patent
Utility mannequin
Copyright
Availability Administration offers with the day-to-day availability of companies. Which of the next takes over when a ‘catastrophe’ state of affairs happens?
Capability Administration
Service Degree Administration
Service Continuity Administration
Service Reporting
IT Service Continuity Administration (ITSCM) is used to help the general Enterprise Continuity Administration (BCM) in an effort to make sure that the required IT infrastructure and the IT service provision are recovered inside an agreed enterprise time scales. Which of the next are the advantages of implementing IT Service Continuity Administration? Every appropriate reply represents a whole resolution. Select all that apply.
It prioritizes the restoration of IT companies by working with BCM and SLM.
It minimizes prices associated with restoration plans utilizing correct proactive planning and testing.
It confirms competence, impartiality, and efficiency functionality of a corporation that performs audits.
It minimizes disruption in IT companies when it follows a significant interruption or catastrophe.
You’re employed as an Incident dealing with supervisor for Orange sect Inc. You detect a virus assault incident within the community of your organization. You develop a signature based mostly on the traits of the detected virus. Which of the next phases within the Incident dealing with course of will make the most of the signature to resolve this incident?
Eradication
Identification
Containment
Recovery