Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

312-76 EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Questions 4

After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?

Options:

A.

Durability

B.

Availability

C.

Reaction

D.

Integrity

Buy Now
Questions 5

Matt is unable to boot his Windows Server 2012 system after an OS update. He later finds out that some of the important files of the boot manager are corrupted and that led to boot manager failure. However, he tries to recover the boot manager using the Command Prompt present in the System Recovery option. Which Command Prompt command should Matt use in this scenario?

Options:

A.

sfc /scannow

B.

ntdsutil

C.

Bootrec /RebuildBCD

D.

repadmin /showrepl

Buy Now
Questions 6

Match the following RAID components with their functions:

Options:

A.

l-ii.2-i.3-iv.4-iii

B.

l-v,2-iv,3-ii, A-ii

C.

l-iii,2-v3-i,4-iv

D.

l-iv.2-iii,3-v,4-i

Buy Now
Questions 7

Which of the following terms refers to the act, manner, or practice of an organization to bring systems, applications, and data back to "normal" conditions in a prescribed and acceptable time frame?

Options:

A.

Disaster Recovery Management

B.

Business Continuity Management (BCM)

C.

Risk Management

D.

Recovery Management

Buy Now
Questions 8

Which of the following technologies is used to create a copy of data on one server on another server?

Options:

A.

Failover Cluster

B.

Snapshots Data

C.

Replication

D.

Cloud Storage

Buy Now
Questions 9

XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?

Options:

A.

Work Recovery Time (WRT)

B.

Recovery Time Objective (RTO)

C.

Maximum Tolerable Downtime (MTD)

D.

Recovery Point Objective (RPO)

Buy Now
Questions 10

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

Options:

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Buy Now
Questions 11

Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?

Options:

A.

Quantitative Risk Assessment

B.

Qualitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Semi-Quantitative Risk Assessment

Buy Now
Questions 12

Jessie was implementing PASIS architecture in her organization in order to keep the organization’s critical data safe, in case a disaster struck. Additionally, she also wanted to prevent unauthorized access of data. After the PASIS architecture was implemented, the critical data was only accessible to the authorized employees. Which feature of PASIS architecture made this possible?

Options:

A.

Reaction

B.

Confidentiality

C.

Availability

D.

Maintenance

Buy Now
Questions 13

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

Options:

A.

High-Availability

B.

Global Load Balancing

C.

Failover

D.

Network Load Balancing

Buy Now
Questions 14

Matt wants his organization to be prepared for any disaster that may occur in the future. In his preparations for the same, he wants to implement a robust storage system for his servers. After conducting thorough research, he arrives at the conclusion that PASIS architecture would be best suited for his requirements as it combines several critical components to provide survivable data storage. Which of the following components does the PASIS architecture integrate?

Options:

A.

Centralized Storage Systems, Deduplication, and Mirroring

B.

Distributed Computing, Data Redundancy and Encoding, and Dynamic Self-Maintenance

C.

Decentralized Storage Systems, Data Redundancy and Encoding, and Dynamic Self-Maintenance

D.

Centralized Computing, Data Redundancy and Encoding

Buy Now
Questions 15

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

Options:

A.

Detailed Awareness Training

B.

Simulation Training

C.

Scenario Training

D.

Introductory Awareness Training

Buy Now
Questions 16

Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?

Options:

A.

DAS

B.

NAS

C.

PAS

D.

RAID

Buy Now
Questions 17

Fred identified that his organization was vulnerable to mainly two risks:

a. One was a sudden power outage that could damage critical data.

b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.

To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?

Options:

A.

Risk Assessment

B.

Risk Management

C.

Risk Identification

D.

Risk Mitigation

Buy Now
Questions 18

Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?

Options:

A.

Domain Controller Servers

B.

IIS Servers

C.

File Servers

D.

Global Catalog Servers

Buy Now
Questions 19

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

Options:

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Buy Now
Questions 20

Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?

Options:

A.

Optical Media Storage

B.

On-Premise Disk-Based Archiving

C.

Legacy Archiving

D.

Cloud-Based Archiving

Buy Now
Questions 21

Which of the following is also known as the doomsday recovery level in 3DR?

Options:

A.

Local Data Protection

B.

Archiving of Data

C.

Backup of Data

D.

Remote Backup of Data Protection

Buy Now
Questions 22

Which of the following terms defines the assessment of the risk factors and the relationship that exists between these factors?

Options:

A.

Risk Models

B.

Risk Management

C.

Risk Mitigation

D.

Risk Assessment

Buy Now
Questions 23

James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?

Options:

A.

Logical

B.

Natural Disaster

C.

Physical

D.

Data Corruption

Buy Now
Questions 24

Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?

Options:

A.

Database Authentication

B.

Database Consolidation

C.

Database Integrity Testing

D.

Backup Integrity Testing

Buy Now
Questions 25

A few days after Fred launched his new website online, he discovers that the site is not accessible. Upon investigation, he learns that some of the hosting files on the server have been corrupted. Which of the following servers would Fred have to restore to get his site back up?

Options:

A.

Application Server

B.

IIS Server

C.

Database Server

D.

Catalog Server

Buy Now
Questions 26

Which of the following terms refers to the delay experienced by a system while it is serving a request?

Options:

A.

Reaction

B.

Durability

C.

Nonrepudiation

D.

Latency

Buy Now
Questions 27

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

Options:

A.

Disaster Management Team

B.

Disaster Management Executive Committee

C.

Disaster Management Team Chairpersons

D.

Disaster Management Team Coordinators

Buy Now
Questions 28

Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?

Options:

A.

Team-wide BIA

B.

Organization-wide BIA

C.

Country-wide BIA

D.

Branch-wide BIA

Buy Now
Questions 29

Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?

Options:

A.

Decentralized Computing

B.

Grid Computing

C.

Cloud Computing

D.

Centralized Computing

Buy Now
Questions 30

Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?

Options:

A.

Return on Risk Adjusted Capital (RORAC)

B.

Value at Risk

C.

Risk Adjusted Return On Capital (RAROC)

D.

Risk Valuation

Buy Now
Questions 31

Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.

Options:

A.

Two drives

B.

Three drives

C.

Four drives

D.

Six drives

Buy Now
Questions 32

Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?

Options:

A.

Point in Time Recovery

B.

Load Balancing

C.

Clustering

D.

High-Availability

Buy Now
Questions 33

Jess, who owns an IT firm, wants to implement the standard for societal security in the business continuity management system in her organization to reap its benefits in the future if a disaster strikes. Which of the following standards should she implement?

Options:

A.

ISO 27031

B.

ISO 22301

C.

NFPA 1600

D.

ISO 27005

Buy Now
Questions 34

Lisa’s organization has multiple servers to cater to the needs of different businesses and clients. Each of these servers runs different applications in order to keep them isolated from each other. The server room incurs a huge cost because of the number of servers owing to the massive cooling systems, server maintenance, data center footprint, and quicker server provisioning. An audit of the resources discovered that most of the servers are idle two-thirds of business hours since these servers are dedicated towards faster recovery during disasters and the isolation of applications. Lisa is looking for a solution to bring down the cost of maintaining these servers, optimize the use of resources, and save money on the energy spent to keep these servers cool. Which solution can meet all these needs of Lisa?

Options:

A.

Virtual Desktop Infrastructure

B.

Operating System Virtualization

C.

Server Replication

D.

Server Virtualization

Buy Now
Questions 35

Which of the following refers to a moveable operating environment that can be set up or installed at any place on transportable units?

Options:

A.

Mobile Recovery Center

B.

Crisis Command Center

C.

Cold Site

D.

Colocation Facilities

Buy Now
Questions 36

Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:

a) Assess the potential impact of the threat on the organization

b) Estimate the probability of occurrence of each threat

c) Assess the internal and external resources available to mitigate the identified threats

d) List the threats that may occur

In which order should Jon implement these steps?

Options:

A.

c, a, d, b

B.

d, b, a, c

C.

b, d, c, a

D.

b, c, d, a

Buy Now
Questions 37

Which of the following terms refers to the process of utilizing the full backup of a file and then modifying that file with one or more incremental backups?

Options:

A.

Incremental Backup

B.

Differential Backup

C.

Synthetic Backup

D.

Incremental Forever Backup

Buy Now
Questions 38

Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?

Options:

A.

Business Impact Analysis

B.

Opportunity Cost

C.

Fixed Cost

D.

Cost Benefit Analysis

Buy Now
Questions 39

To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?

Options:

A.

Near-line

B.

Onsite

C.

Online

D.

Offsite

Buy Now
Questions 40

Which of the following terms refers to a dedicated server that is also used for file storage and sharing?

Options:

A.

Data Virtualization

B.

Cloud Storage

C.

Storage Area Network (SAN)

D.

Network Attached Storage (NAS)

Buy Now
Questions 41

Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?

Options:

A.

Transparency

B.

Openness

C.

Scalability

D.

Monotonicity

Buy Now
Questions 42

Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?

Options:

A.

Mirroring

B.

Virtualization

C.

Deduplication

D.

Snapshot

Buy Now
Questions 43

What is the main objective of a BC test plan?

Options:

A.

To demonstrate proficiency in management response and crisis conditions

B.

To ensure the plan is accurate and relevant under adverse circumstances

C.

To diverge from the test storyboard to include unplanned events or circumstances

D.

Not threaten the normal business operations of an organization

Buy Now
Questions 44

Which of the following methods keeps the SYSVOL folder synchronized inside multiple servers present on the same domain?

Options:

A.

Load Balancing

B.

Failover

C.

Distributed File System Replication

D.

Data Backup

Buy Now
Questions 45

Which layer of the Recovery Management Model would provide hassle-free recovery of systems in case of a disaster and would enable the control of data protection technologies such as replication and backup?

Options:

A.

Protection Technologies Layer

B.

Testing Simulation Layer

C.

Common Management Layer

D.

Analytics and Reporting Layer

Buy Now
Exam Code: 312-76
Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)
Last Update: Apr 20, 2025
Questions: 150
312-76 pdf

312-76 PDF

$25.5  $84.99
312-76 Engine

312-76 Testing Engine

$30  $99.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$40.5  $134.99