After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?
Matt is unable to boot his Windows Server 2012 system after an OS update. He later finds out that some of the important files of the boot manager are corrupted and that led to boot manager failure. However, he tries to recover the boot manager using the Command Prompt present in the System Recovery option. Which Command Prompt command should Matt use in this scenario?
Which of the following terms refers to the act, manner, or practice of an organization to bring systems, applications, and data back to "normal" conditions in a prescribed and acceptable time frame?
Which of the following technologies is used to create a copy of data on one server on another server?
XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?
Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?
Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?
Jessie was implementing PASIS architecture in her organization in order to keep the organization’s critical data safe, in case a disaster struck. Additionally, she also wanted to prevent unauthorized access of data. After the PASIS architecture was implemented, the critical data was only accessible to the authorized employees. Which feature of PASIS architecture made this possible?
XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?
Matt wants his organization to be prepared for any disaster that may occur in the future. In his preparations for the same, he wants to implement a robust storage system for his servers. After conducting thorough research, he arrives at the conclusion that PASIS architecture would be best suited for his requirements as it combines several critical components to provide survivable data storage. Which of the following components does the PASIS architecture integrate?
Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?
Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?
Fred identified that his organization was vulnerable to mainly two risks:
a. One was a sudden power outage that could damage critical data.
b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.
To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?
Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?
Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:
Very High
High
Medium
Low
Very LowWhich assessment method did Jonathan use to perform the risk assessment?
Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?
Which of the following terms defines the assessment of the risk factors and the relationship that exists between these factors?
James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?
Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?
A few days after Fred launched his new website online, he discovers that the site is not accessible. Upon investigation, he learns that some of the hosting files on the server have been corrupted. Which of the following servers would Fred have to restore to get his site back up?
Which of the following terms refers to the delay experienced by a system while it is serving a request?
Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?
Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?
Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?
Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.
Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?
Jess, who owns an IT firm, wants to implement the standard for societal security in the business continuity management system in her organization to reap its benefits in the future if a disaster strikes. Which of the following standards should she implement?
Lisa’s organization has multiple servers to cater to the needs of different businesses and clients. Each of these servers runs different applications in order to keep them isolated from each other. The server room incurs a huge cost because of the number of servers owing to the massive cooling systems, server maintenance, data center footprint, and quicker server provisioning. An audit of the resources discovered that most of the servers are idle two-thirds of business hours since these servers are dedicated towards faster recovery during disasters and the isolation of applications. Lisa is looking for a solution to bring down the cost of maintaining these servers, optimize the use of resources, and save money on the energy spent to keep these servers cool. Which solution can meet all these needs of Lisa?
Which of the following refers to a moveable operating environment that can be set up or installed at any place on transportable units?
Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:
a) Assess the potential impact of the threat on the organization
b) Estimate the probability of occurrence of each threat
c) Assess the internal and external resources available to mitigate the identified threats
d) List the threats that may occur
In which order should Jon implement these steps?
Which of the following terms refers to the process of utilizing the full backup of a file and then modifying that file with one or more incremental backups?
Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?
To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?
Which of the following terms refers to a dedicated server that is also used for file storage and sharing?
Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?
Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?
Which of the following methods keeps the SYSVOL folder synchronized inside multiple servers present on the same domain?
Which layer of the Recovery Management Model would provide hassle-free recovery of systems in case of a disaster and would enable the control of data protection technologies such as replication and backup?
Certified Ethical Hacker | 312-76 Questions Answers | 312-76 Test Prep | Disaster Recovery Professional Practice Test Questions PDF | 312-76 Online Exam | 312-76 Practice Test | 312-76 PDF | 312-76 Test Questions | 312-76 Study Material | 312-76 Exam Preparation | 312-76 Valid Dumps | 312-76 Real Questions | Certified Ethical Hacker 312-76 Exam Questions