Month End Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ECCouncil 312-76 EC-Council Disaster Recovery Professional v3 (EDRP) Exam Practice Test

Page: 1 / 15
Total 150 questions

EC-Council Disaster Recovery Professional v3 (EDRP) Questions and Answers

Question 1

Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?

Options:

A.

Deja Dup

B.

Checkpoints

C.

Shadow Copy

D.

Snapshots

Question 2

Which of the following terms refers to a client-server architecture that is merged with layered architecture?

Options:

A.

N-Tier Architecture

B.

Application Server-Tier Architecture

C.

Client-Server Architecture

D.

Tightly Coupled Architecture

Question 3

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.

Options:

A.

NAS

B.

SCSI

C.

SAN

D.

SAS

Question 4

James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?

Options:

A.

Risk Adjusted Return on Capital (RAROC)

B.

Risk Adjusted Performance Management (RAPM)

C.

Risk Adjusted Return on Risk Adjusted Capital (RARORAC)

D.

Return on Risk Adjusted Capital (RORAC)

Question 5

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

Options:

A.

High-Availability

B.

Global Load Balancing

C.

Failover

D.

Network Load Balancing

Question 6

Phoebe was conducting several test cases in her organization for the disaster recovery plan. For the cases to be successful, at least 90% of the test cases must pass. What is this scenario known as?

Options:

A.

Entry Criteria

B.

Exit Criteria

C.

Software Testing Lifecycle

D.

Suspension Criteria

Question 7

The internal audit of the BCP takes place so as to make sure the plan conforms to which particular standard?

Options:

A.

ISO 22301:2012

B.

ISO/IEC 27005:2011

C.

ISO/IEC 27031:2011

D.

ISO 22313

Question 8

Rachel was reviewing the various tiers of disaster recovery so as to implement them in her startup. One particular tier attracted her attention, and she wanted to put it into effect in her startup. This specific disaster recovery tier backed up data over a WAN connection. Which disaster recovery tier did Rachel want to implement in her startup?

Options:

A.

Tier 5

B.

Tier 3

C.

Tier 0

D.

Tier 6

Question 9

When information confidentiality increases in PASIS architecture, what else also increases as a direct result?

Options:

A.

Reaction

B.

Latency

C.

Storage Requirement

D.

Durability

Question 10

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

Options:

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Question 11

Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.

Options:

A.

Two drives

B.

Three drives

C.

Four drives

D.

Six drives

Question 12

Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?

Options:

A.

Team-wide BIA

B.

Organization-wide BIA

C.

Country-wide BIA

D.

Branch-wide BIA

Question 13

Jessie was implementing PASIS architecture in her organization in order to keep the organization’s critical data safe, in case a disaster struck. Additionally, she also wanted to prevent unauthorized access of data. After the PASIS architecture was implemented, the critical data was only accessible to the authorized employees. Which feature of PASIS architecture made this possible?

Options:

A.

Reaction

B.

Confidentiality

C.

Availability

D.

Maintenance

Question 14

Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?

Options:

A.

Server Migration

B.

Data Replication

C.

Authoritative Active Directory Restoration

D.

Non-Authoritative Active Directory Restoration

Question 15

Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:

    It has a parity check to store all the information about the data in multiple drives.

    Help reconstruct the data during downtime.

    Process the data at a good speed.

    Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

Options:

A.

RAID 10

B.

RAID 1

C.

RAID 1 (Duplicate option, likely typo for another level)

D.

RAID 3

Question 16

Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?

Options:

A.

Simulation Test

B.

Orientation Test

C.

Checklist Test

D.

Tabletop Test

Question 17

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

Options:

A.

Offsite Backup

B.

Cloud Backup

C.

Onsite Backup

D.

Hot Site Backup

Question 18

Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?

Options:

A.

Operations Team

B.

Support Team

C.

Planning Team

D.

Technology Team

Question 19

James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?

Options:

A.

Logical

B.

Natural Disaster

C.

Physical

D.

Data Corruption

Question 20

Which of the following terms refers to the act, manner, or practice of an organization to bring systems, applications, and data back to "normal" conditions in a prescribed and acceptable time frame?

Options:

A.

Disaster Recovery Management

B.

Business Continuity Management (BCM)

C.

Risk Management

D.

Recovery Management

Question 21

Which of the following clusters uses mounted file systems to read and write data?

Options:

A.

Storage Cluster

B.

High-Performance Clusters

C.

Failover Cluster

D.

High-Availability Cluster

Question 22

Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?

Options:

A.

Functional Test

B.

Simulation Test

C.

Checklist Test

D.

Orientation Test

Question 23

Joanna installed a software on her office computer that backed up, restored, and recovered database files. The software performed these functions using database server sessions. Which software did Joanna install?

Options:

A.

Virtuozzo

B.

Disk Drill

C.

Recuva

D.

RMAN

Question 24

Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?

Options:

A.

Bare Metal Recovery

B.

System Restore

C.

Mirroring

D.

System Image Recovery

Question 25

Which of the following is NOT an advantage of colocation facilities?

Options:

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Question 26

Using which feature of Windows 10 can users preserve the state of the systems including the important system files, installed applications, and system settings?

Options:

A.

System Backup

B.

System Restore

C.

System Update

D.

Failover Replication

Question 27

Max and Carl, two partners in an organization, are considering whether to implement a standard that provides a framework of methods and processes to identify and specify all aspects for improving an organization’s ICT readiness to ensure business continuity. Which standard are Max and Carl discussing?

Options:

A.

ISO 27031

B.

ISO 27005

C.

ISO 22313

D.

INCITS 483-2012

Question 28

Which of the following disaster recovery tiers makes use of point-in-time copies?

Options:

A.

Tier 4

B.

Tier 5

C.

Tier 0

D.

Tier 6

Question 29

ABC Inc. has a host of servers, each serving a different purpose. Almost all of them are critical to the functioning of the business. Most of the servers were virtualized and had backup virtual components. Thus, when the memory of one server crashed in the middle of a busy business day, it did not affect the operations as the server quickly switched to a different virtual memory, which was kept as a backup for this purpose precisely. What is such a feature called?

Options:

A.

Deduplication

B.

High Availability

C.

Fault Tolerance

D.

Mirroring

Question 30

To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?

Options:

A.

Near-line

B.

Onsite

C.

Online

D.

Offsite

Question 31

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

Options:

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Question 32

Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?

Options:

A.

Availability

B.

Integrity

C.

Nonrepudiation

D.

Precaution

Question 33

Jake was preparing a particular plan for his organization in which all personnel accountable for research, development, and implementation of the disaster recovery plan were being identified. Which plan was Jake preparing for his organization?

Options:

A.

Business Continuity Plan

B.

Disaster Management Plan

C.

IT Recovery Plan

D.

Disaster Recovery Plan

Question 34

Which disaster recovery plan is very expensive and disrupts normal business operations?

Options:

A.

Full Interruption Testing

B.

Simulation Testing

C.

Parallel Testing

D.

Checklist Testing

Question 35

Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?

Options:

A.

Mirroring

B.

Deduplication

C.

Failover

D.

Server Clustering

Question 36

Which of the following terms refers to the delay experienced by a system while it is serving a request?

Options:

A.

Reaction

B.

Durability

C.

Nonrepudiation

D.

Latency

Question 37

Which of the following technical processes provides additional security to virtual machines by disabling unnecessary interfaces, devices, ports, and services?

Options:

A.

Restriction of Physical Access

B.

Defense-in-Depth

C.

Isolation of Security Functions

D.

Hardening

Question 38

Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?

Options:

A.

Optical Media Storage

B.

On-Premise Disk-Based Archiving

C.

Legacy Archiving

D.

Cloud-Based Archiving

Question 39

XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?

Options:

A.

Work Recovery Time (WRT)

B.

Recovery Time Objective (RTO)

C.

Maximum Tolerable Downtime (MTD)

D.

Recovery Point Objective (RPO)

Question 40

Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?

Options:

A.

Restoration

B.

Resumption

C.

Response

D.

Business Continuity

Question 41

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

Options:

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Question 42

After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?

Options:

A.

Durability

B.

Availability

C.

Reaction

D.

Integrity

Question 43

Jill wanted to start a food truck with her savings from her previous job. Before she did so, she wanted to make sure that it would prove to be a feasible investment. After discussing her plans with a few industry professionals, she was advised to conduct an analysis to help her decide if the business would prove to be profitable in the monetary sense. Which analysis was Jill advised to conduct?

Options:

A.

Risk Analysis

B.

Cost Benefit Analysis

C.

Cost Analysis

D.

Business Impact Analysis

Question 44

Which of the following options must be considered by an organization when conducting BIA?

Options:

A.

Transferring a business activity to a third-party

B.

Ceasing or changing a business activity if viable alternatives are available

C.

Time scales for assessment

D.

Establishing alternate processes or creating redundancy/spare capacity in processes

Question 45

Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?

Options:

A.

System Migration

B.

System Backup

C.

System Replication

D.

System Recovery

Page: 1 / 15
Total 150 questions