Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

312-76 EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Questions 4

Which of the following is a feature of mainframe computers?

Options:

A.

Proven Reliability

B.

Openness

C.

Pluralism

D.

Transparency

Buy Now
Questions 5

Which of the following terms refers to third-party backup, and offsite replication?

Options:

A.

Continuous Data Protection

B.

Managed Disaster Recovery

C.

Tape Vaulting

D.

Disk Shadowing

Buy Now
Questions 6

Which of the following terms refers to the process of utilizing the full backup of a file and then modifying that file with one or more incremental backups?

Options:

A.

Incremental Backup

B.

Differential Backup

C.

Synthetic Backup

D.

Incremental Forever Backup

Buy Now
Questions 7

What is the main objective of a BC test plan?

Options:

A.

To demonstrate proficiency in management response and crisis conditions

B.

To ensure the plan is accurate and relevant under adverse circumstances

C.

To diverge from the test storyboard to include unplanned events or circumstances

D.

Not threaten the normal business operations of an organization

Buy Now
Questions 8

Which of the following is NOT an advantage of colocation facilities?

Options:

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Buy Now
Questions 9

In which scenario training phase is a debrief conducted with the participants to obtain more feedback?

Options:

A.

Execution Phase

B.

Review Phase

C.

Warning Phase

D.

Planning Phase

Buy Now
Questions 10

Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.

Options:

A.

Two drives

B.

Three drives

C.

Four drives

D.

Six drives

Buy Now
Questions 11

Which of the following terms refers to a dedicated server that is also used for file storage and sharing?

Options:

A.

Data Virtualization

B.

Cloud Storage

C.

Storage Area Network (SAN)

D.

Network Attached Storage (NAS)

Buy Now
Questions 12

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

Options:

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Buy Now
Questions 13

Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?

Options:

A.

Data Recovery

B.

Disaster Recovery

C.

Application Recovery

D.

Recovery Management

Buy Now
Questions 14

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

Options:

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Buy Now
Questions 15

When information confidentiality increases in PASIS architecture, what else also increases as a direct result?

Options:

A.

Reaction

B.

Latency

C.

Storage Requirement

D.

Durability

Buy Now
Questions 16

A US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to set up a RAID level that requires a minimum of six drives to meet high fault tolerance and high speed for the data read and write operations. What RAID level is John considering to meet this requirement?

Options:

A.

RAID Level 50

B.

RAID Level 10

C.

RAID Level 1

D.

RAID Level 5

Buy Now
Questions 17

Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?

Options:

A.

Full Backup

B.

Normal Backup

C.

Incremental Backup

D.

Differential Backup

Buy Now
Questions 18

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

Options:

A.

High-Availability

B.

Global Load Balancing

C.

Failover

D.

Network Load Balancing

Buy Now
Questions 19

Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?

Options:

A.

Delete the child disk of the snapshots present in the host machine

B.

Delete the virtual machine database

C.

Uninstall the Hypervisor

D.

Shut down or restart the virtual machine system

Buy Now
Questions 20

Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?

Options:

A.

Team-wide BIA

B.

Organization-wide BIA

C.

Country-wide BIA

D.

Branch-wide BIA

Buy Now
Questions 21

Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?

Options:

A.

Cloud-based Storage

B.

Virtual Machines

C.

Software Defined Data Center

D.

Data Virtualization

Buy Now
Questions 22

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

Options:

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Buy Now
Questions 23

Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?

Options:

A.

Business Impact Analysis

B.

Opportunity Cost

C.

Fixed Cost

D.

Cost Benefit Analysis

Buy Now
Questions 24

XYZ Inc. has set up an FTP server between its primary site of business and its backup site. Jennifer, the IT administrator, is charged with transferring all the critical data to the backup site via this FTP server. Which of the following terms best describes the process?

Options:

A.

Electronic Vaulting

B.

Disk Duplexing

C.

Disk Shadowing

D.

Manually copying the data files and transferring them to the remote site

Buy Now
Questions 25

Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?

Options:

A.

Availability

B.

Integrity

C.

Nonrepudiation

D.

Precaution

Buy Now
Questions 26

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

Options:

A.

Detailed Awareness Training

B.

Simulation Training

C.

Scenario Training

D.

Introductory Awareness Training

Buy Now
Questions 27

Jessie was implementing PASIS architecture in her organization in order to keep the organization’s critical data safe, in case a disaster struck. Additionally, she also wanted to prevent unauthorized access of data. After the PASIS architecture was implemented, the critical data was only accessible to the authorized employees. Which feature of PASIS architecture made this possible?

Options:

A.

Reaction

B.

Confidentiality

C.

Availability

D.

Maintenance

Buy Now
Questions 28

Alan wants to start backing up the news articles his team generates every day. Usually, his team churns out three or four articles daily. Since the time taken to back up the articles is essentially a downtime forthe team, he does not want the backing up process to be too time-consuming. Which of the following backups would suit Alan’s needs?

Options:

A.

Incremental Backup

B.

Differential Backup

C.

Full System Backup

D.

Online Data Backup

Buy Now
Questions 29

Jack updated the operating system of his MacBook to the latest beta version. A few hours later, while working on his MacBook, Jack discovers that some of his installed applications are not working properly, and this may be due to the bug-ridden beta update. Hence, he decides to restore his MacBook to the previous OS version. Which MacBook feature should Jack be using in this scenario?

Options:

A.

Time Shift

B.

Image Recovery

C.

Snapshots

D.

Time Machine

Buy Now
Questions 30

Due to the occurrence of a disaster, the data and applications at Phil’s organization were lost. Fortunately, Phil had invested in a disaster recovery tier. This disaster recovery tier provided Phil with automated recovery of data and applications. Which disaster recovery tier did Phil invest in?

Options:

A.

Tier 4

B.

Tier 7

C.

Tier 6

D.

Tier 2

Buy Now
Questions 31

To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?

Options:

A.

ISO 27001

B.

INCITS 483-2012

C.

ISO 27031

D.

ISO/IEC 27005

Buy Now
Questions 32

Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?

Options:

A.

Bare Metal Recovery

B.

System Restore

C.

Mirroring

D.

System Image Recovery

Buy Now
Questions 33

Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?

Options:

A.

Restoration

B.

Resumption

C.

Response

D.

Business Continuity

Buy Now
Questions 34

James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?

Options:

A.

Logical

B.

Natural Disaster

C.

Physical

D.

Data Corruption

Buy Now
Questions 35

Which of the following terms refers to the delay experienced by a system while it is serving a request?

Options:

A.

Reaction

B.

Durability

C.

Nonrepudiation

D.

Latency

Buy Now
Questions 36

Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?

Options:

A.

Cloud Backup

B.

Disk Imaging

C.

Visualization

D.

Bare-metal Restore

Buy Now
Questions 37

An organization is facing issues with updating its data since it has been the culture of the organization for employees to create individual backups for the same data. This is not only consuming a lot of virtual storage space but is also eating into the bandwidth of the organization. Additionally, this can also lead to a potential data leak in the organization. What can be done to contain this situation?

Options:

A.

Data Erasure

B.

Data Remanence

C.

Failover

D.

Deduplication

Buy Now
Questions 38

Which of the following clusters provides consistent file system images across servers in a cluster, allowing the servers to simultaneously read and write to a single shared file system?

Options:

A.

High-Performance Clusters

B.

High-Availability Clusters

C.

Failover Cluster

D.

Storage Cluster

Buy Now
Questions 39

Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?

Options:

A.

Quantitative Risk Assessment

B.

Qualitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Semi-Quantitative Risk Assessment

Buy Now
Questions 40

Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?

Options:

A.

NFPA 1600

B.

ISO 27005

C.

INCITS 483-2012

D.

ISO 27031

Buy Now
Questions 41

Which of the following disaster recovery tiers makes use of point-in-time copies?

Options:

A.

Tier 4

B.

Tier 5

C.

Tier 0

D.

Tier 6

Buy Now
Questions 42

Matt wants his organization to be prepared for any disaster that may occur in the future. In his preparations for the same, he wants to implement a robust storage system for his servers. After conducting thorough research, he arrives at the conclusion that PASIS architecture would be best suited for his requirements as it combines several critical components to provide survivable data storage. Which of the following components does the PASIS architecture integrate?

Options:

A.

Centralized Storage Systems, Deduplication, and Mirroring

B.

Distributed Computing, Data Redundancy and Encoding, and Dynamic Self-Maintenance

C.

Decentralized Storage Systems, Data Redundancy and Encoding, and Dynamic Self-Maintenance

D.

Centralized Computing, Data Redundancy and Encoding

Buy Now
Questions 43

The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?

Options:

A.

Merge Replication

B.

Transactional Replication

C.

SQL Server Replication

D.

Snapshot Replication

Buy Now
Questions 44

While implementing a business continuity plan in her organization, Jane wants to make use of a specific standard. This specific standard would guide her organization in establishing, implementing, and maintaining a formal and documented business impact analysis (BIA) process. Which of the following standards did Jane want to implement in her organization?

Options:

A.

ISO/IEC 27005

B.

AS/NZS 5050

C.

ISO/TS 22317

D.

ISO/IEC 27031

Buy Now
Questions 45

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

Options:

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Buy Now
Exam Code: 312-76
Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)
Last Update: Mar 29, 2025
Questions: 150

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99