Eccouncil Disaster Recovery Professional 312-76 Exam Questions

Page: 1 / 14
Total 290 questions
Question 1

Which of the following systems helps to detect the "abuse of privileges" attack that does not actually involve exploiting any security vulnerability?



Answer : C


Question 2

Which of the following workforces works to handle the incidents in an enterprise?



Answer : C


Question 3

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?



Answer : D


Question 4

Which of the following actions can be performed by using the principle of separation of duties?



Answer : D


Question 5

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?



Answer : C


Question 6

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?



Answer : C


Question 7

Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?



Answer : A


Page:    1 / 14   
Total 290 questions