Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ECCouncil 312-76 EC-Council Disaster Recovery Professional v3 (EDRP) Exam Practice Test

Demo: 45 questions
Total 150 questions

EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Question 1

Which of the following is NOT an advantage of colocation facilities?

Options:

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Question 2

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

Options:

A.

High-Availability

B.

Global Load Balancing

C.

Failover

D.

Network Load Balancing

Question 3

Amy was conducting a disaster recovery test at her clinic. In this test scenario, a real-life disaster was mimicked, and important aspects such as software, communication, procedures, and personnel were tested. Which test was Amy conducting?

Options:

A.

Walkthrough Testing

B.

Parallel Testing

C.

Full Interruption Testing

D.

Simulation Testing

Question 4

Which of the following terms refers to a dedicated server that is also used for file storage and sharing?

Options:

A.

Data Virtualization

B.

Cloud Storage

C.

Storage Area Network (SAN)

D.

Network Attached Storage (NAS)

Question 5

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

Options:

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Question 6

Gloria was auditing the BCP prepared by one of her clients. The BCP audit stage that she was currently examining ascertained whether operational resiliency and continuity was being encouraged, and if the BCP was overfunded or underfunded. Which BCP audit stage was Gloria examining?

Options:

A.

Ongoing Program Management

B.

Overall Program Governance

C.

Management of Process Changes

D.

Overall Testing of the Plan

Question 7

Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?

Options:

A.

Functional Test

B.

Simulation Test

C.

Checklist Test

D.

Orientation Test

Question 8

Which of the following terms refers to the backing up of files that have been modified, changed, or have been added since the last full backup?

Options:

A.

Differential Backup

B.

Full System Backup

C.

Incremental Backup

D.

Online Data Backup

Question 9

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

Options:

A.

Offsite Backup

B.

Cloud Backup

C.

Onsite Backup

D.

Hot Site Backup

Question 10

An organization is facing issues with updating its data since it has been the culture of the organization for employees to create individual backups for the same data. This is not only consuming a lot of virtual storage space but is also eating into the bandwidth of the organization. Additionally, this can also lead to a potential data leak in the organization. What can be done to contain this situation?

Options:

A.

Data Erasure

B.

Data Remanence

C.

Failover

D.

Deduplication

Question 11

Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?

Options:

A.

Operations Team

B.

Support Team

C.

Planning Team

D.

Technology Team

Question 12

Katie was setting up disaster recovery teams in her organization to combat any disaster that occurred. One of the most important teams was the disaster recovery coordinator. Having two names in mind for the post, Katie interviewed the two people for the roles and responsibilities of the disaster recovery coordinator. Which of the following statements should either of the interviewees use to get the post?

Options:

A.

Responsible for disaster recovery planning verification and compliance

B.

Day-to-day management control over the execution and maintenance of the disaster recovery program

C.

Responsible for the specification and design of all technology-based disaster recovery solutions

D.

Executive authority over the disaster recovery program

Question 13

Lisa’s organization has multiple servers to cater to the needs of different businesses and clients. Each of these servers runs different applications in order to keep them isolated from each other. The server room incurs a huge cost because of the number of servers owing to the massive cooling systems, server maintenance, data center footprint, and quicker server provisioning. An audit of the resources discovered that most of the servers are idle two-thirds of business hours since these servers are dedicated towards faster recovery during disasters and the isolation of applications. Lisa is looking for a solution to bring down the cost of maintaining these servers, optimize the use of resources, and save money on the energy spent to keep these servers cool. Which solution can meet all these needs of Lisa?

Options:

A.

Virtual Desktop Infrastructure

B.

Operating System Virtualization

C.

Server Replication

D.

Server Virtualization

Question 14

Which of the following is not an objective of business impact analysis?

Options:

A.

Assess the Impact Caused by a Threat

B.

Identify the Critical Resources Required by the Business

C.

Establish the Recovery Order of the Critical Business Functions

D.

Identify RTO and RPO for Each Process

Question 15

Which of the following is also known as the doomsday recovery level in 3DR?

Options:

A.

Local Data Protection

B.

Archiving of Data

C.

Backup of Data

D.

Remote Backup of Data Protection

Question 16

In which of the following tests is the entire BCP implemented?

Options:

A.

Orientation Test

B.

Functional Test

C.

Full-Scale Test

D.

Simulation Test

Question 17

Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?

Options:

A.

Team-wide BIA

B.

Organization-wide BIA

C.

Country-wide BIA

D.

Branch-wide BIA

Question 18

Which of the following is not a component of BIA?

Options:

A.

Feedback

B.

Executive Sponsorship

C.

Safety

D.

Formation of Committee

Question 19

Matt wants his organization to be prepared for any disaster that may occur in the future. In his preparations for the same, he wants to implement a robust storage system for his servers. After conducting thorough research, he arrives at the conclusion that PASIS architecture would be best suited for his requirements as it combines several critical components to provide survivable data storage. Which of the following components does the PASIS architecture integrate?

Options:

A.

Centralized Storage Systems, Deduplication, and Mirroring

B.

Distributed Computing, Data Redundancy and Encoding, and Dynamic Self-Maintenance

C.

Decentralized Storage Systems, Data Redundancy and Encoding, and Dynamic Self-Maintenance

D.

Centralized Computing, Data Redundancy and Encoding

Question 20

Which of the following terms refers to the delay experienced by a system while it is serving a request?

Options:

A.

Reaction

B.

Durability

C.

Nonrepudiation

D.

Latency

Question 21

Which of the following methods keeps the SYSVOL folder synchronized inside multiple servers present on the same domain?

Options:

A.

Load Balancing

B.

Failover

C.

Distributed File System Replication

D.

Data Backup

Question 22

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Object Granularity (ROG)

C.

Recovery Location Scope (RLS)

D.

Recovery Service Resiliency (RSR)

Question 23

Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?

Options:

A.

Risk Management

B.

Business Impact Analysis

C.

Risk Assessment

D.

Vulnerability Assessment

Question 24

Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?

Options:

A.

Windows Server Backup, Microsoft Management Console

B.

Windows Server Backup, Administrative Tools

C.

Server Migration, Microsoft Management Console

D.

Server Migration, Administrative Tools

Question 25

After Colin’s organization had identified and prioritized the risks faced by the organization, Colin decided to implement certain strategies to manage risk (also known as risk response). Which of the following strategies is not a part of risk response?

Options:

A.

Acceptance

B.

Mitigation

C.

Safety

D.

Sharing

Question 26

Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?

Options:

A.

Deja Dup

B.

Checkpoints

C.

Shadow Copy

D.

Snapshots

Question 27

Jess, who owns an IT firm, wants to implement the standard for societal security in the business continuity management system in her organization to reap its benefits in the future if a disaster strikes. Which of the following standards should she implement?

Options:

A.

ISO 27031

B.

ISO 22301

C.

NFPA 1600

D.

ISO 27005

Question 28

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

Options:

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Question 29

Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?

Options:

A.

Optical Media Storage

B.

On-Premise Disk-Based Archiving

C.

Legacy Archiving

D.

Cloud-Based Archiving

Question 30

In which disaster recovery tier is data backed up with a hot site?

Options:

A.

Tier 1

B.

Tier 5

C.

Tier 2

D.

Tier 4

Question 31

Which of the following is a virtualization standard specified by the Distributed Management Task Force (DMTF)?

Options:

A.

PCI Data Security Standard (PCI DSS)

B.

Cloud Security Alliance (CSA)

C.

vCloud API

D.

Open Virtualization Format (OVF)

Question 32

Which disaster recovery plan is very expensive and disrupts normal business operations?

Options:

A.

Full Interruption Testing

B.

Simulation Testing

C.

Parallel Testing

D.

Checklist Testing

Question 33

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

Options:

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Question 34

Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:

a) Assess the potential impact of the threat on the organization

b) Estimate the probability of occurrence of each threat

c) Assess the internal and external resources available to mitigate the identified threats

d) List the threats that may occur

In which order should Jon implement these steps?

Options:

A.

c, a, d, b

B.

d, b, a, c

C.

b, d, c, a

D.

b, c, d, a

Question 35

Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?

Options:

A.

Decentralized Computing

B.

Grid Computing

C.

Cloud Computing

D.

Centralized Computing

Question 36

Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.

Options:

A.

Two drives

B.

Three drives

C.

Four drives

D.

Six drives

Question 37

Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:

    It has a parity check to store all the information about the data in multiple drives.

    Help reconstruct the data during downtime.

    Process the data at a good speed.

    Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

Options:

A.

RAID 10

B.

RAID 1

C.

RAID 1 (Duplicate option, likely typo for another level)

D.

RAID 3

Question 38

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

Options:

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Question 39

Which of the following is NOT a component of a centralized governance structure for Business Continuity and Risk Management?

Options:

A.

Programs and Practices

B.

Enablement

C.

Effectiveness

D.

Authenticity

Question 40

Which of the following terms refers to any circumstance with the potential to disrupt or degrade the quality of operations or assets?

Options:

A.

Impact

B.

Vulnerability

C.

Hazard

D.

Threat

Question 41

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

Options:

A.

Detailed Awareness Training

B.

Simulation Training

C.

Scenario Training

D.

Introductory Awareness Training

Question 42

Which of the following terms refers to a backup that is taken when the database is offline?

Options:

A.

Online Data Backup

B.

Hot Backup

C.

Full System Backup

D.

Cold Backup

Question 43

Which of the following terms refers to third-party backup, and offsite replication?

Options:

A.

Continuous Data Protection

B.

Managed Disaster Recovery

C.

Tape Vaulting

D.

Disk Shadowing

Question 44

Rachel was reviewing the various tiers of disaster recovery so as to implement them in her startup. One particular tier attracted her attention, and she wanted to put it into effect in her startup. This specific disaster recovery tier backed up data over a WAN connection. Which disaster recovery tier did Rachel want to implement in her startup?

Options:

A.

Tier 5

B.

Tier 3

C.

Tier 0

D.

Tier 6

Question 45

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

Options:

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Demo: 45 questions
Total 150 questions