312-76試験無料問題集「EC-COUNCIL EC-Council Disaster Recovery Professional (EDRP) 認定」

Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?

Which of the following systems helps to detect the "abuse of privileges" attack that does not actually involve exploiting any security vulnerability?

Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?

In which of the following scenarios is database backup transferred to a remote site in a bulk transfer fashion?

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?

Which of the following actions can be performed by using the principle of separation of duties?

Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?

Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?

Which of the following is a category of an automated Incident detection process?

Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic.
The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?

Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.

正解:A,B,C 解答を投票する
Which of the following terms best describes the presence of any potential event that causes an undesirable impact on the organization?

Which of the following cryptographic system services assures the receiver that the received message has not been altered?

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the following statements are true about BS 7799?
Each correct answer represents a complete solution. Choose all that apply.

正解:A,B,D 解答を投票する
Fill in the blank with the appropriate phrase.
____________ privilege escalation is the process of attempting to access sources with a higher access, such as a user account trying to access admin privileges.
正解:
Vertical
Which of the following components in a TCB acts as the boundary that separates the TCB from the remainder of the system?

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Which of the following cryptographic system services assures the receiver that the received message has not been altered?