Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

ECCouncil 312-76 Dumps

Page: 1 / 15
Total 150 questions

EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Question 1

Which of the following is a feature of mainframe computers?

Options:

A.

Proven Reliability

B.

Openness

C.

Pluralism

D.

Transparency

Question 2

Which of the following terms refers to a dedicated server that is also used for file storage and sharing?

Options:

A.

Data Virtualization

B.

Cloud Storage

C.

Storage Area Network (SAN)

D.

Network Attached Storage (NAS)

Question 3

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

Options:

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Question 4

Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?

Options:

A.

Optical Media Storage

B.

On-Premise Disk-Based Archiving

C.

Legacy Archiving

D.

Cloud-Based Archiving

Question 5

Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?

Options:

A.

Risk Management

B.

Business Impact Analysis

C.

Risk Assessment

D.

Vulnerability Assessment

Question 6

Phoebe was conducting several test cases in her organization for the disaster recovery plan. For the cases to be successful, at least 90% of the test cases must pass. What is this scenario known as?

Options:

A.

Entry Criteria

B.

Exit Criteria

C.

Software Testing Lifecycle

D.

Suspension Criteria

Question 7

Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?

Options:

A.

Differential Backup

B.

Online Data Backup

C.

Incremental Backup

D.

Full System Backup

Question 8

Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?

Options:

A.

Simulation Test

B.

Orientation Test

C.

Checklist Test

D.

Tabletop Test

Question 9

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Object Granularity (ROG)

C.

Recovery Location Scope (RLS)

D.

Recovery Service Resiliency (RSR)

Question 10

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

Options:

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Question 11

Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?

Options:

A.

Mirroring

B.

Virtualization

C.

Deduplication

D.

Snapshot

Question 12

Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?

Options:

A.

Data Recovery

B.

Disaster Recovery

C.

Application Recovery

D.

Recovery Management

Question 13

Which of the following terms refers to the ease with which technicians can resolve or replace failing components or systems?

Options:

A.

Reparability

B.

Recoverability

C.

Robustness

D.

Redundancy

Question 14

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

Options:

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Question 15

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

Options:

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Question 16

Which of the following virtualization methods requires a software called containers or virtual engines to run?

Options:

A.

Data Virtualization

B.

Network Virtualization

C.

Desktop Virtualization

D.

OS-Based Virtualization

Question 17

Which of the following terms refers to a storage system that consists of hard disk drives (HDDs) that look and act like a physical tape library?

Options:

A.

Virtual Tape Library (VTL)

B.

Mirroring

C.

Disk-to-Disk (D2D)

D.

Snapshot

Question 18

Katie was setting up disaster recovery teams in her organization to combat any disaster that occurred. One of the most important teams was the disaster recovery coordinator. Having two names in mind for the post, Katie interviewed the two people for the roles and responsibilities of the disaster recovery coordinator. Which of the following statements should either of the interviewees use to get the post?

Options:

A.

Responsible for disaster recovery planning verification and compliance

B.

Day-to-day management control over the execution and maintenance of the disaster recovery program

C.

Responsible for the specification and design of all technology-based disaster recovery solutions

D.

Executive authority over the disaster recovery program

Question 19

Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?

Options:

A.

Windows Server Backup, Microsoft Management Console

B.

Windows Server Backup, Administrative Tools

C.

Server Migration, Microsoft Management Console

D.

Server Migration, Administrative Tools

Question 20

Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?

Options:

A.

Decentralized Computing

B.

Grid Computing

C.

Cloud Computing

D.

Centralized Computing

Question 21

Which of the following terms refers to a graphical representation of a series of data protection tools and services that are designed to help balance the overall cost of data protection against the time-to-recovery in the event of data loss?

Options:

A.

3DR

B.

Continuous Data Protection

C.

Data Protection Continuum

D.

Data Backup

Question 22

Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?

Options:

A.

System Migration

B.

System Backup

C.

System Replication

D.

System Recovery

Question 23

Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?

Options:

A.

Deja Dup

B.

Checkpoints

C.

Shadow Copy

D.

Snapshots

Question 24

Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?

Options:

A.

Prevention

B.

Backup

C.

Recovery

D.

Resumption

Question 25

Which of the following is NOT an advantage of colocation facilities?

Options:

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Question 26

Which of the following is also known as the doomsday recovery level in 3DR?

Options:

A.

Local Data Protection

B.

Archiving of Data

C.

Backup of Data

D.

Remote Backup of Data Protection

Question 27

Jill wanted to start a food truck with her savings from her previous job. Before she did so, she wanted to make sure that it would prove to be a feasible investment. After discussing her plans with a few industry professionals, she was advised to conduct an analysis to help her decide if the business would prove to be profitable in the monetary sense. Which analysis was Jill advised to conduct?

Options:

A.

Risk Analysis

B.

Cost Benefit Analysis

C.

Cost Analysis

D.

Business Impact Analysis

Question 28

Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?

Options:

A.

Transparency

B.

Openness

C.

Scalability

D.

Monotonicity

Question 29

To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?

Options:

A.

Near-line

B.

Onsite

C.

Online

D.

Offsite

Question 30

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

Options:

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Question 31

In which disaster recovery tier is data backed up with a hot site?

Options:

A.

Tier 1

B.

Tier 5

C.

Tier 2

D.

Tier 4

Question 32

Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?

Options:

A.

Database Authentication

B.

Database Consolidation

C.

Database Integrity Testing

D.

Backup Integrity Testing

Question 33

In which of the following tests is the entire BCP implemented?

Options:

A.

Orientation Test

B.

Functional Test

C.

Full-Scale Test

D.

Simulation Test

Question 34

Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?

Options:

A.

Domain Controller Servers

B.

IIS Servers

C.

File Servers

D.

Global Catalog Servers

Question 35

While implementing a business continuity plan in her organization, Jane wants to make use of a specific standard. This specific standard would guide her organization in establishing, implementing, and maintaining a formal and documented business impact analysis (BIA) process. Which of the following standards did Jane want to implement in her organization?

Options:

A.

ISO/IEC 27005

B.

AS/NZS 5050

C.

ISO/TS 22317

D.

ISO/IEC 27031

Question 36

Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?

Options:

A.

Cloud-based Storage

B.

Virtual Machines

C.

Software Defined Data Center

D.

Data Virtualization

Question 37

Which of the following terms measures the severity of the impact of a risk on a business?

Options:

A.

Recovery Time

B.

Frequency

C.

Recovery Scale

D.

Assessment Scale

Question 38

Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?

Options:

A.

#backup running-configuration ftp

B.

#backup running-configuration ftp

C.

#copy running-configuration ftp

D.

#copy running-configuration tftp

Question 39

Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?

Options:

A.

Business Impact Analysis

B.

Opportunity Cost

C.

Fixed Cost

D.

Cost Benefit Analysis

Question 40

Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?

Options:

A.

Restoration

B.

Resumption

C.

Response

D.

Business Continuity

Question 41

Which of the following clusters provides consistent file system images across servers in a cluster, allowing the servers to simultaneously read and write to a single shared file system?

Options:

A.

High-Performance Clusters

B.

High-Availability Clusters

C.

Failover Cluster

D.

Storage Cluster

Question 42

Which of the following terms refers to third-party backup, and offsite replication?

Options:

A.

Continuous Data Protection

B.

Managed Disaster Recovery

C.

Tape Vaulting

D.

Disk Shadowing

Question 43

Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?

Options:

A.

Return

B.

Resume

C.

Reduce

D.

Recover

Question 44

After Colin’s organization had identified and prioritized the risks faced by the organization, Colin decided to implement certain strategies to manage risk (also known as risk response). Which of the following strategies is not a part of risk response?

Options:

A.

Acceptance

B.

Mitigation

C.

Safety

D.

Sharing

Question 45

Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?

Options:

A.

Survivable Storage System

B.

Decentralized Computing

C.

Mirroring

D.

Mainframe Computer System

Page: 1 / 15
Total 150 questions