Special Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

312-76 EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Questions 4

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

Options:

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Buy Now
Questions 5

Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?

Options:

A.

Mirroring

B.

Deduplication

C.

Failover

D.

Server Clustering

Buy Now
Questions 6

Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:

a) Assess the potential impact of the threat on the organization

b) Estimate the probability of occurrence of each threat

c) Assess the internal and external resources available to mitigate the identified threats

d) List the threats that may occur

In which order should Jon implement these steps?

Options:

A.

c, a, d, b

B.

d, b, a, c

C.

b, d, c, a

D.

b, c, d, a

Buy Now
Questions 7

Which of the following terms refers to a graphical representation of a series of data protection tools and services that are designed to help balance the overall cost of data protection against the time-to-recovery in the event of data loss?

Options:

A.

3DR

B.

Continuous Data Protection

C.

Data Protection Continuum

D.

Data Backup

Buy Now
Questions 8

ABC Inc. has a host of servers, each serving a different purpose. Almost all of them are critical to the functioning of the business. Most of the servers were virtualized and had backup virtual components. Thus, when the memory of one server crashed in the middle of a busy business day, it did not affect the operations as the server quickly switched to a different virtual memory, which was kept as a backup for this purpose precisely. What is such a feature called?

Options:

A.

Deduplication

B.

High Availability

C.

Fault Tolerance

D.

Mirroring

Buy Now
Questions 9

Which of the following three components define the three-tier architecture in decentralized computing?

Options:

A.

Tightly Coupled, Client, and Peer-to-Peer

B.

Client, Peer-to-Peer, and Application

C.

Application, Peer-to-Peer, and Tightly Coupled

D.

Client, Application Server, and Database Server

Buy Now
Questions 10

Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:

    It has a parity check to store all the information about the data in multiple drives.

    Help reconstruct the data during downtime.

    Process the data at a good speed.

    Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

Options:

A.

RAID 10

B.

RAID 1

C.

RAID 1 (Duplicate option, likely typo for another level)

D.

RAID 3

Buy Now
Questions 11

Which of the following terms refers to the blueprint that calls out the tactics, which eventually dictate how continuity and recovery from a disaster will be achieved?

Options:

A.

Business Continuity Management

B.

Crisis Management

C.

Business Continuity Plan

D.

Business Continuity Strategy

Buy Now
Questions 12

Due to the occurrence of a disaster, the data and applications at Phil’s organization were lost. Fortunately, Phil had invested in a disaster recovery tier. This disaster recovery tier provided Phil with automated recovery of data and applications. Which disaster recovery tier did Phil invest in?

Options:

A.

Tier 4

B.

Tier 7

C.

Tier 6

D.

Tier 2

Buy Now
Questions 13

Jess, who owns an IT firm, wants to implement the standard for societal security in the business continuity management system in her organization to reap its benefits in the future if a disaster strikes. Which of the following standards should she implement?

Options:

A.

ISO 27031

B.

ISO 22301

C.

NFPA 1600

D.

ISO 27005

Buy Now
Questions 14

Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?

Options:

A.

Full Backup

B.

Normal Backup

C.

Incremental Backup

D.

Differential Backup

Buy Now
Questions 15

Where can the VM Management Service be located in the Hyper-V architecture?

Options:

A.

Child Partition

B.

Parent Partition

C.

Hypervisor Layer

D.

Windows Kernel

Buy Now
Questions 16

Jack is a system administrator working in a data center, which operates thousands of virtual servers running on Microsoft’s virtualization platform, Hyper-V. Jack’s manager advises him to take a snapshot backup instead of a full backup of the virtual machines running on Hyper-V to save the backup time. Which native feature present in Hyper-V Manager should he use in this scenario?

Options:

A.

System Backup

B.

Checkpoint Backup

C.

Snapshots Backup

D.

Hyper-V Replication

Buy Now
Questions 17

Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?

Options:

A.

Point in Time Recovery

B.

Load Balancing

C.

Clustering

D.

High-Availability

Buy Now
Questions 18

Oliver’s team had been working hard on a proposal for a new project. After meticulously working out the details for a month, they found out that someone had leaked their proposal to their competitor and they had lost the project. This impacted their morale hugely, and for the next two months, all the other projects progressed extremely slowly resulting in their delay. Which of the following best describes the impact that this data breach had on the organization?

Options:

A.

Semi-Qualitative Impact

B.

Qualitative Impact

C.

Quantitative Impact

D.

Industrial Impact

Buy Now
Questions 19

Which of the following is a virtualization standard specified by the Distributed Management Task Force (DMTF)?

Options:

A.

PCI Data Security Standard (PCI DSS)

B.

Cloud Security Alliance (CSA)

C.

vCloud API

D.

Open Virtualization Format (OVF)

Buy Now
Questions 20

John wanted to transfer his organization’s data to an alternate site. He wanted the alternate site to run in parallel to the primary site, which would allow his organization to continue normal business operations almost immediately in the event of a disruption. Which of the following sites is best suited to John’s requirements?

Options:

A.

Cold Site

B.

Warm Site

C.

Hot Site

D.

Colocation Facilities

Buy Now
Questions 21

Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?

Options:

A.

Functional Test

B.

Simulation Test

C.

Checklist Test

D.

Orientation Test

Buy Now
Questions 22

James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?

Options:

A.

Risk Adjusted Return on Capital (RAROC)

B.

Risk Adjusted Performance Management (RAPM)

C.

Risk Adjusted Return on Risk Adjusted Capital (RARORAC)

D.

Return on Risk Adjusted Capital (RORAC)

Buy Now
Questions 23

Which of the following services provides mail and calendar services?

Options:

A.

Application Server

B.

Web Server

C.

Exchange Server

D.

Domain Controller

Buy Now
Questions 24

Phil, an entrepreneur, is running an important experiment on a virtual machine that may give him a breakthrough in the research for his next product. Unfortunately, while the experiment was being conducted, the virtual machine crashed. Fortunately, Phil had implemented a method that took a backup of the machine at regular intervals and would provide an architectural instance of the last saved version of the virtual machine. Which backup method did Phil implement?

Options:

A.

Snapshot

B.

Mirroring

C.

Continuous Data Protection (CDP)

D.

Disk-to-Disk (D2D)

Buy Now
Questions 25

An online betting site accepts bets for sporting events held around the world. Due to this, their operations need to be up 24x7. During an internal IT audit, they discovered a vulnerability in their payment gateway system. They assessed that should the payment gateway go down for more than an hour, they will lose about $100,000 and about 15% of their customers to their competitor website. Moreover, they might lose 25% of their customer base permanently due to the constant promotions run by their competitor to attract and retain new customers. This was unacceptable for the business under any circumstances, so immediate corrective measures were taken to fix the vulnerability. What technical term best defines this time period of two hours?

Options:

A.

Recovery Point Objective (RPO)

B.

Maximum Tolerable Period of Disruption (MTPOD)

C.

Recovery Time Objective (RTO)

D.

Work Recovery Time (WRT)

Buy Now
Questions 26

Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?

Options:

A.

Team-wide BIA

B.

Organization-wide BIA

C.

Country-wide BIA

D.

Branch-wide BIA

Buy Now
Questions 27

Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?

Options:

A.

Deja Dup

B.

Checkpoints

C.

Shadow Copy

D.

Snapshots

Buy Now
Questions 28

After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?

Options:

A.

Durability

B.

Availability

C.

Reaction

D.

Integrity

Buy Now
Questions 29

To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?

Options:

A.

ISO 27001

B.

INCITS 483-2012

C.

ISO 27031

D.

ISO/IEC 27005

Buy Now
Questions 30

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

Options:

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Buy Now
Questions 31

Which of the following terms refers to a client-server architecture that is merged with layered architecture?

Options:

A.

N-Tier Architecture

B.

Application Server-Tier Architecture

C.

Client-Server Architecture

D.

Tightly Coupled Architecture

Buy Now
Questions 32

Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?

Options:

A.

DAS

B.

NAS

C.

PAS

D.

RAID

Buy Now
Questions 33

Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?

Options:

A.

Return

B.

Resume

C.

Reduce

D.

Recover

Buy Now
Questions 34

Joan was conducting a particular disaster recovery test in her startup. In this test, the effectiveness, bottlenecks, or any weaknesses in the plan had to be confirmed by the team members. Which test was Joan conducting?

Options:

A.

Walkthrough Testing

B.

Full Interruption Testing

C.

Parallel Testing

D.

Simulation Testing

Buy Now
Questions 35

Which of the following is also known as the doomsday recovery level in 3DR?

Options:

A.

Local Data Protection

B.

Archiving of Data

C.

Backup of Data

D.

Remote Backup of Data Protection

Buy Now
Questions 36

Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?

Options:

A.

Business Impact Analysis

B.

Opportunity Cost

C.

Fixed Cost

D.

Cost Benefit Analysis

Buy Now
Questions 37

Craig runs a back-end support center for a few technology clients. Due to the global nature of his clientele, the operations need to be up 24x7. However, he can afford a downtime of a few days in the event of a disaster owing to the non-emergency nature of the products he supports. He identified a backup site for his operations to which he can switch in case his primary site of business is rendered defunct by a disaster. Since he has the buffer of a few days, he decided that he would pre-install the hardware and pre-configure restoration settings at the backup site. This will allow him to get hisoperations up and running within the specified RTO. Which of the following backup sites did Craig go for?

Options:

A.

Cold Sites

B.

Colocation Facilities

C.

Warm Sites

D.

Hot Sites

Buy Now
Questions 38

In which scenario training phase is a debrief conducted with the participants to obtain more feedback?

Options:

A.

Execution Phase

B.

Review Phase

C.

Warning Phase

D.

Planning Phase

Buy Now
Questions 39

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

Options:

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Buy Now
Questions 40

Richard was a cautious person, and he used to back up his organization’s data daily at 8:00 pm. One day, due to a fire in his office building at 9:00 am, servers containing critical data were destroyed. It would take about 8 hours for Richard’s organization to transfer the backed-up data from the alternate site to the primary site. Based on the last data backup, the recovery time in this scenario is ‘minus 13 hours’. What technical term best defines this time period of 13 hours?

Options:

A.

Recovery Time Objective (RTO)

B.

Maximum Acceptable Outage (MAO)

C.

Recovery Point Objective (RPO)

D.

Single Point of Failure (SPOF)

Buy Now
Questions 41

Gloria was auditing the BCP prepared by one of her clients. The BCP audit stage that she was currently examining ascertained whether operational resiliency and continuity was being encouraged, and if the BCP was overfunded or underfunded. Which BCP audit stage was Gloria examining?

Options:

A.

Ongoing Program Management

B.

Overall Program Governance

C.

Management of Process Changes

D.

Overall Testing of the Plan

Buy Now
Questions 42

What is the name of the shared directory in the Microsoft Server OS, which contains the copy of commonly shared and replicated public files of that particular domain?

Options:

A.

ADFS

B.

SYSVOL

C.

inetpub

D.

Public Files

Buy Now
Questions 43

Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?

Options:

A.

Cloud Backup

B.

Disk Imaging

C.

Visualization

D.

Bare-metal Restore

Buy Now
Questions 44

Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?

Options:

A.

Three Tier

B.

Client-Server

C.

Peer-to-Peer

D.

N-Tier

Buy Now
Questions 45

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.

Options:

A.

NAS

B.

SCSI

C.

SAN

D.

SAS

Buy Now
Exam Code: 312-76
Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)
Last Update: Mar 31, 2025
Questions: 150

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now 312-76 testing engine

PDF (Q&A)

$31.5  $104.99
buy now 312-76 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Apr 2025