EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers
Which of the following is a feature of mainframe computers?
Which of the following terms refers to a dedicated server that is also used for file storage and sharing?
Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?
Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?
Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?
Phoebe was conducting several test cases in her organization for the disaster recovery plan. For the cases to be successful, at least 90% of the test cases must pass. What is this scenario known as?
Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?
Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?
ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?
Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?
Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?
Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?
Which of the following terms refers to the ease with which technicians can resolve or replace failing components or systems?
Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?
Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?
Which of the following virtualization methods requires a software called containers or virtual engines to run?
Which of the following terms refers to a storage system that consists of hard disk drives (HDDs) that look and act like a physical tape library?
Katie was setting up disaster recovery teams in her organization to combat any disaster that occurred. One of the most important teams was the disaster recovery coordinator. Having two names in mind for the post, Katie interviewed the two people for the roles and responsibilities of the disaster recovery coordinator. Which of the following statements should either of the interviewees use to get the post?
Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?
Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?
Which of the following terms refers to a graphical representation of a series of data protection tools and services that are designed to help balance the overall cost of data protection against the time-to-recovery in the event of data loss?
Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?
Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?
Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?
Which of the following is NOT an advantage of colocation facilities?
Which of the following is also known as the doomsday recovery level in 3DR?
Jill wanted to start a food truck with her savings from her previous job. Before she did so, she wanted to make sure that it would prove to be a feasible investment. After discussing her plans with a few industry professionals, she was advised to conduct an analysis to help her decide if the business would prove to be profitable in the monetary sense. Which analysis was Jill advised to conduct?
Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?
To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?
Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?
In which disaster recovery tier is data backed up with a hot site?
Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?
In which of the following tests is the entire BCP implemented?
Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?
While implementing a business continuity plan in her organization, Jane wants to make use of a specific standard. This specific standard would guide her organization in establishing, implementing, and maintaining a formal and documented business impact analysis (BIA) process. Which of the following standards did Jane want to implement in her organization?
Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?
Which of the following terms measures the severity of the impact of a risk on a business?
Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?
Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?
Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?
Which of the following clusters provides consistent file system images across servers in a cluster, allowing the servers to simultaneously read and write to a single shared file system?
Which of the following terms refers to third-party backup, and offsite replication?
Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?
After Colin’s organization had identified and prioritized the risks faced by the organization, Colin decided to implement certain strategies to manage risk (also known as risk response). Which of the following strategies is not a part of risk response?
Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?