Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ECCouncil 312-76 Dumps Questions Answers

Page: 1 / 11
Total 150 questions

EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Question 1

Which of the following terms refers to a collection of historical records specifically selected for long-term retention and future reference?

Options:

A.

Data Archiving

B.

Data Backup

C.

Data Restore

D.

Data Deletion

Buy Now
Question 2

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.

Options:

A.

NAS

B.

SCSI

C.

SAN

D.

SAS

Question 3

Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?

Options:

A.

Differential Backup

B.

Online Data Backup

C.

Incremental Backup

D.

Full System Backup

Question 4

Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?

Options:

A.

Cloud-based Storage

B.

Virtual Machines

C.

Software Defined Data Center

D.

Data Virtualization

Question 5

Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?

Options:

A.

Mirroring

B.

Virtualization

C.

Deduplication

D.

Snapshot

Question 6

Which of the following terms refers to a storage system that consists of hard disk drives (HDDs) that look and act like a physical tape library?

Options:

A.

Virtual Tape Library (VTL)

B.

Mirroring

C.

Disk-to-Disk (D2D)

D.

Snapshot

Question 7

To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?

Options:

A.

ISO 27001

B.

INCITS 483-2012

C.

ISO 27031

D.

ISO/IEC 27005

Question 8

Lisa’s organization has multiple servers to cater to the needs of different businesses and clients. Each of these servers runs different applications in order to keep them isolated from each other. The server room incurs a huge cost because of the number of servers owing to the massive cooling systems, server maintenance, data center footprint, and quicker server provisioning. An audit of the resources discovered that most of the servers are idle two-thirds of business hours since these servers are dedicated towards faster recovery during disasters and the isolation of applications. Lisa is looking for a solution to bring down the cost of maintaining these servers, optimize the use of resources, and save money on the energy spent to keep these servers cool. Which solution can meet all these needs of Lisa?

Options:

A.

Virtual Desktop Infrastructure

B.

Operating System Virtualization

C.

Server Replication

D.

Server Virtualization

Question 9

Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?

Options:

A.

Bare Metal Recovery

B.

System Restore

C.

Mirroring

D.

System Image Recovery

Question 10

Which of the following three components define the three-tier architecture in decentralized computing?

Options:

A.

Tightly Coupled, Client, and Peer-to-Peer

B.

Client, Peer-to-Peer, and Application

C.

Application, Peer-to-Peer, and Tightly Coupled

D.

Client, Application Server, and Database Server

Question 11

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

Options:

A.

High-Availability

B.

Global Load Balancing

C.

Failover

D.

Network Load Balancing

Question 12

Which of the following terms refers to the training milestones that must be achieved in order to meet the BC training program’s aim?

Options:

A.

Time-Related Objectives

B.

Development Objectives

C.

Routine Objectives

D.

Terminal Objectives

Question 13

Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?

Options:

A.

Transparency

B.

Openness

C.

Scalability

D.

Monotonicity

Question 14

After Colin’s organization had identified and prioritized the risks faced by the organization, Colin decided to implement certain strategies to manage risk (also known as risk response). Which of the following strategies is not a part of risk response?

Options:

A.

Acceptance

B.

Mitigation

C.

Safety

D.

Sharing

Question 15

Which of the following terms refers to a graphical representation of a series of data protection tools and services that are designed to help balance the overall cost of data protection against the time-to-recovery in the event of data loss?

Options:

A.

3DR

B.

Continuous Data Protection

C.

Data Protection Continuum

D.

Data Backup

Question 16

In which scenario training phase is a debrief conducted with the participants to obtain more feedback?

Options:

A.

Execution Phase

B.

Review Phase

C.

Warning Phase

D.

Planning Phase

Question 17

Fred identified that his organization was vulnerable to mainly two risks:

a. One was a sudden power outage that could damage critical data.

b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.

To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?

Options:

A.

Risk Assessment

B.

Risk Management

C.

Risk Identification

D.

Risk Mitigation

Question 18

Which of the following terms refers to the backing up of files that have been modified, changed, or have been added since the last full backup?

Options:

A.

Differential Backup

B.

Full System Backup

C.

Incremental Backup

D.

Online Data Backup

Question 19

Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?

Options:

A.

Three Tier

B.

Client-Server

C.

Peer-to-Peer

D.

N-Tier

Question 20

Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?

Options:

A.

Restoration

B.

Resumption

C.

Response

D.

Business Continuity

Question 21

Which of the following terms measures the severity of the impact of a risk on a business?

Options:

A.

Recovery Time

B.

Frequency

C.

Recovery Scale

D.

Assessment Scale

Question 22

Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?

Options:

A.

Domain Controller Servers

B.

IIS Servers

C.

File Servers

D.

Global Catalog Servers

Question 23

Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?

Options:

A.

Optical Media Storage

B.

On-Premise Disk-Based Archiving

C.

Legacy Archiving

D.

Cloud-Based Archiving

Question 24

Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?

Options:

A.

System Migration

B.

System Backup

C.

System Replication

D.

System Recovery

Question 25

Joan was conducting a particular disaster recovery test in her startup. In this test, the effectiveness, bottlenecks, or any weaknesses in the plan had to be confirmed by the team members. Which test was Joan conducting?

Options:

A.

Walkthrough Testing

B.

Full Interruption Testing

C.

Parallel Testing

D.

Simulation Testing

Question 26

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

Options:

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Question 27

Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?

Options:

A.

#backup running-configuration ftp

B.

#backup running-configuration ftp

C.

#copy running-configuration ftp

D.

#copy running-configuration tftp

Question 28

James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?

Options:

A.

Logical

B.

Natural Disaster

C.

Physical

D.

Data Corruption

Question 29

Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?

Options:

A.

Data Recovery

B.

Disaster Recovery

C.

Application Recovery

D.

Recovery Management

Question 30

Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?

Options:

A.

Decentralized Computing

B.

Grid Computing

C.

Cloud Computing

D.

Centralized Computing

Question 31

Which of the following is a virtualization standard specified by the Distributed Management Task Force (DMTF)?

Options:

A.

PCI Data Security Standard (PCI DSS)

B.

Cloud Security Alliance (CSA)

C.

vCloud API

D.

Open Virtualization Format (OVF)

Question 32

Which of the following options must be considered by an organization when conducting BIA?

Options:

A.

Transferring a business activity to a third-party

B.

Ceasing or changing a business activity if viable alternatives are available

C.

Time scales for assessment

D.

Establishing alternate processes or creating redundancy/spare capacity in processes

Question 33

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

Options:

A.

Disaster Management Team

B.

Disaster Management Executive Committee

C.

Disaster Management Team Chairpersons

D.

Disaster Management Team Coordinators

Question 34

Richard was a cautious person, and he used to back up his organization’s data daily at 8:00 pm. One day, due to a fire in his office building at 9:00 am, servers containing critical data were destroyed. It would take about 8 hours for Richard’s organization to transfer the backed-up data from the alternate site to the primary site. Based on the last data backup, the recovery time in this scenario is ‘minus 13 hours’. What technical term best defines this time period of 13 hours?

Options:

A.

Recovery Time Objective (RTO)

B.

Maximum Acceptable Outage (MAO)

C.

Recovery Point Objective (RPO)

D.

Single Point of Failure (SPOF)

Question 35

Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?

Options:

A.

Full Backup

B.

Normal Backup

C.

Incremental Backup

D.

Differential Backup

Question 36

Phil, an entrepreneur, is running an important experiment on a virtual machine that may give him a breakthrough in the research for his next product. Unfortunately, while the experiment was being conducted, the virtual machine crashed. Fortunately, Phil had implemented a method that took a backup of the machine at regular intervals and would provide an architectural instance of the last saved version of the virtual machine. Which backup method did Phil implement?

Options:

A.

Snapshot

B.

Mirroring

C.

Continuous Data Protection (CDP)

D.

Disk-to-Disk (D2D)

Question 37

ABC Inc. has a host of servers, each serving a different purpose. Almost all of them are critical to the functioning of the business. Most of the servers were virtualized and had backup virtual components. Thus, when the memory of one server crashed in the middle of a busy business day, it did not affect the operations as the server quickly switched to a different virtual memory, which was kept as a backup for this purpose precisely. What is such a feature called?

Options:

A.

Deduplication

B.

High Availability

C.

Fault Tolerance

D.

Mirroring

Question 38

After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?

Options:

A.

Durability

B.

Availability

C.

Reaction

D.

Integrity

Question 39

Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?

Options:

A.

Server Migration

B.

Data Replication

C.

Authoritative Active Directory Restoration

D.

Non-Authoritative Active Directory Restoration

Question 40

Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?

Options:

A.

Database Authentication

B.

Database Consolidation

C.

Database Integrity Testing

D.

Backup Integrity Testing

Question 41

Alan wants to start backing up the news articles his team generates every day. Usually, his team churns out three or four articles daily. Since the time taken to back up the articles is essentially a downtime forthe team, he does not want the backing up process to be too time-consuming. Which of the following backups would suit Alan’s needs?

Options:

A.

Incremental Backup

B.

Differential Backup

C.

Full System Backup

D.

Online Data Backup

Question 42

Matt is unable to boot his Windows Server 2012 system after an OS update. He later finds out that some of the important files of the boot manager are corrupted and that led to boot manager failure. However, he tries to recover the boot manager using the Command Prompt present in the System Recovery option. Which Command Prompt command should Matt use in this scenario?

Options:

A.

sfc /scannow

B.

ntdsutil

C.

Bootrec /RebuildBCD

D.

repadmin /showrepl

Question 43

Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?

Options:

A.

DAS

B.

NAS

C.

PAS

D.

RAID

Question 44

Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?

Options:

A.

Windows Server Backup, Microsoft Management Console

B.

Windows Server Backup, Administrative Tools

C.

Server Migration, Microsoft Management Console

D.

Server Migration, Administrative Tools

Question 45

Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?

Options:

A.

Return

B.

Resume

C.

Reduce

D.

Recover

Page: 1 / 11
Total 150 questions