Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

312-76 Sample Questions Answers

Questions 4

Which of the following terms refers to the process of utilizing the full backup of a file and then modifying that file with one or more incremental backups?

Options:

A.

Incremental Backup

B.

Differential Backup

C.

Synthetic Backup

D.

Incremental Forever Backup

Buy Now
Questions 5

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

Options:

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Buy Now
Questions 6

Which of the following services provides mail and calendar services?

Options:

A.

Application Server

B.

Web Server

C.

Exchange Server

D.

Domain Controller

Buy Now
Questions 7

In which scenario training phase is a debrief conducted with the participants to obtain more feedback?

Options:

A.

Execution Phase

B.

Review Phase

C.

Warning Phase

D.

Planning Phase

Buy Now
Questions 8

Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?

Options:

A.

DAS

B.

NAS

C.

PAS

D.

RAID

Buy Now
Questions 9

Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?

Options:

A.

Return on Risk Adjusted Capital (RORAC)

B.

Value at Risk

C.

Risk Adjusted Return On Capital (RAROC)

D.

Risk Valuation

Buy Now
Questions 10

Which of the following options must be considered by an organization when conducting BIA?

Options:

A.

Transferring a business activity to a third-party

B.

Ceasing or changing a business activity if viable alternatives are available

C.

Time scales for assessment

D.

Establishing alternate processes or creating redundancy/spare capacity in processes

Buy Now
Questions 11

Which of the following refers to a moveable operating environment that can be set up or installed at any place on transportable units?

Options:

A.

Mobile Recovery Center

B.

Crisis Command Center

C.

Cold Site

D.

Colocation Facilities

Buy Now
Questions 12

Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?

Options:

A.

Mirroring

B.

Deduplication

C.

Failover

D.

Server Clustering

Buy Now
Questions 13

Which of the following terms refers to any circumstance with the potential to disrupt or degrade the quality of operations or assets?

Options:

A.

Impact

B.

Vulnerability

C.

Hazard

D.

Threat

Buy Now
Questions 14

A hospital was upgrading its records to a digital form. In the process, it was also moving from manual processes in the emergency room to automated online processes. Since this information was extremely vital and could not be unavailable for even minutes, the IT department proposed a solution that would address this need. In the proposed system, a secondary server would take over the primary one automatically the second the primary server goes down for any reason. This required the two servers to be in coordination at all times. Which solution is the IT department proposing?

Options:

A.

Database Replication

B.

Failover

C.

Deduplication

D.

Point in Time Recovery

Buy Now
Questions 15

After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?

Options:

A.

Durability

B.

Availability

C.

Reaction

D.

Integrity

Buy Now
Questions 16

Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?

Options:

A.

Decentralized Computing

B.

Grid Computing

C.

Cloud Computing

D.

Centralized Computing

Buy Now
Questions 17

An organization is facing issues with updating its data since it has been the culture of the organization for employees to create individual backups for the same data. This is not only consuming a lot of virtual storage space but is also eating into the bandwidth of the organization. Additionally, this can also lead to a potential data leak in the organization. What can be done to contain this situation?

Options:

A.

Data Erasure

B.

Data Remanence

C.

Failover

D.

Deduplication

Buy Now
Questions 18

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

Options:

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Buy Now
Questions 19

Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?

Options:

A.

Point in Time Recovery

B.

Load Balancing

C.

Clustering

D.

High-Availability

Buy Now
Questions 20

Gloria was auditing the BCP prepared by one of her clients. The BCP audit stage that she was currently examining ascertained whether operational resiliency and continuity was being encouraged, and if the BCP was overfunded or underfunded. Which BCP audit stage was Gloria examining?

Options:

A.

Ongoing Program Management

B.

Overall Program Governance

C.

Management of Process Changes

D.

Overall Testing of the Plan

Buy Now
Questions 21

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

Options:

A.

Offsite Backup

B.

Cloud Backup

C.

Onsite Backup

D.

Hot Site Backup

Buy Now
Questions 22

Which of the following terms refers to a graphical representation of a series of data protection tools and services that are designed to help balance the overall cost of data protection against the time-to-recovery in the event of data loss?

Options:

A.

3DR

B.

Continuous Data Protection

C.

Data Protection Continuum

D.

Data Backup

Buy Now
Questions 23

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

Options:

A.

Disaster Management Team

B.

Disaster Management Executive Committee

C.

Disaster Management Team Chairpersons

D.

Disaster Management Team Coordinators

Buy Now
Questions 24

Which of the following is NOT a component of a centralized governance structure for Business Continuity and Risk Management?

Options:

A.

Programs and Practices

B.

Enablement

C.

Effectiveness

D.

Authenticity

Buy Now
Questions 25

An online betting site accepts bets for sporting events held around the world. Due to this, their operations need to be up 24x7. During an internal IT audit, they discovered a vulnerability in their payment gateway system. They assessed that should the payment gateway go down for more than an hour, they will lose about $100,000 and about 15% of their customers to their competitor website. Moreover, they might lose 25% of their customer base permanently due to the constant promotions run by their competitor to attract and retain new customers. This was unacceptable for the business under any circumstances, so immediate corrective measures were taken to fix the vulnerability. What technical term best defines this time period of two hours?

Options:

A.

Recovery Point Objective (RPO)

B.

Maximum Tolerable Period of Disruption (MTPOD)

C.

Recovery Time Objective (RTO)

D.

Work Recovery Time (WRT)

Buy Now
Questions 26

Due to the occurrence of a disaster, the data and applications at Phil’s organization were lost. Fortunately, Phil had invested in a disaster recovery tier. This disaster recovery tier provided Phil with automated recovery of data and applications. Which disaster recovery tier did Phil invest in?

Options:

A.

Tier 4

B.

Tier 7

C.

Tier 6

D.

Tier 2

Buy Now
Questions 27

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.

Options:

A.

NAS

B.

SCSI

C.

SAN

D.

SAS

Buy Now
Questions 28

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

Options:

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Buy Now
Questions 29

What is the name of the shared directory in the Microsoft Server OS, which contains the copy of commonly shared and replicated public files of that particular domain?

Options:

A.

ADFS

B.

SYSVOL

C.

inetpub

D.

Public Files

Buy Now
Questions 30

Which of the following three components define the three-tier architecture in decentralized computing?

Options:

A.

Tightly Coupled, Client, and Peer-to-Peer

B.

Client, Peer-to-Peer, and Application

C.

Application, Peer-to-Peer, and Tightly Coupled

D.

Client, Application Server, and Database Server

Buy Now
Questions 31

Alan wants to start backing up the news articles his team generates every day. Usually, his team churns out three or four articles daily. Since the time taken to back up the articles is essentially a downtime forthe team, he does not want the backing up process to be too time-consuming. Which of the following backups would suit Alan’s needs?

Options:

A.

Incremental Backup

B.

Differential Backup

C.

Full System Backup

D.

Online Data Backup

Buy Now
Questions 32

Matt is the security advisor for a global online stock brokering organization. He wants to back up his organization’s critical data but is faced with a challenge. Due to the real-time data updating nature of his organization’s business, he cannot have any downtime for his systems to back them up. Which of the following backup techniques can help Matt overcome this challenge?

Options:

A.

Incremental Backup

B.

Cold Backup

C.

Hot Backup

D.

Online Data Backup

Buy Now
Questions 33

Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?

Options:

A.

Simulation Test

B.

Orientation Test

C.

Checklist Test

D.

Tabletop Test

Buy Now
Questions 34

Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?

Options:

A.

System Migration

B.

System Backup

C.

System Replication

D.

System Recovery

Buy Now
Questions 35

Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?

Options:

A.

Mirroring

B.

Virtualization

C.

Deduplication

D.

Snapshot

Buy Now
Questions 36

Which of the following terms refers to third-party backup, and offsite replication?

Options:

A.

Continuous Data Protection

B.

Managed Disaster Recovery

C.

Tape Vaulting

D.

Disk Shadowing

Buy Now
Questions 37

Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?

Options:

A.

Return

B.

Resume

C.

Reduce

D.

Recover

Buy Now
Questions 38

A few days after Fred launched his new website online, he discovers that the site is not accessible. Upon investigation, he learns that some of the hosting files on the server have been corrupted. Which of the following servers would Fred have to restore to get his site back up?

Options:

A.

Application Server

B.

IIS Server

C.

Database Server

D.

Catalog Server

Buy Now
Questions 39

Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?

Options:

A.

Windows Server Backup, Microsoft Management Console

B.

Windows Server Backup, Administrative Tools

C.

Server Migration, Microsoft Management Console

D.

Server Migration, Administrative Tools

Buy Now
Questions 40

Amy was conducting a disaster recovery test at her clinic. In this test scenario, a real-life disaster was mimicked, and important aspects such as software, communication, procedures, and personnel were tested. Which test was Amy conducting?

Options:

A.

Walkthrough Testing

B.

Parallel Testing

C.

Full Interruption Testing

D.

Simulation Testing

Buy Now
Questions 41

Which of the following clusters uses mounted file systems to read and write data?

Options:

A.

Storage Cluster

B.

High-Performance Clusters

C.

Failover Cluster

D.

High-Availability Cluster

Buy Now
Questions 42

Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?

Options:

A.

Server Migration

B.

Data Replication

C.

Authoritative Active Directory Restoration

D.

Non-Authoritative Active Directory Restoration

Buy Now
Questions 43

Phoebe was conducting several test cases in her organization for the disaster recovery plan. For the cases to be successful, at least 90% of the test cases must pass. What is this scenario known as?

Options:

A.

Entry Criteria

B.

Exit Criteria

C.

Software Testing Lifecycle

D.

Suspension Criteria

Buy Now
Questions 44

James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?

Options:

A.

Risk Adjusted Return on Capital (RAROC)

B.

Risk Adjusted Performance Management (RAPM)

C.

Risk Adjusted Return on Risk Adjusted Capital (RARORAC)

D.

Return on Risk Adjusted Capital (RORAC)

Buy Now
Questions 45

Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?

Options:

A.

NFPA 1600

B.

ISO 27005

C.

INCITS 483-2012

D.

ISO 27031

Buy Now
Exam Code: 312-76
Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)
Last Update: Jul 3, 2025
Questions: 150
$66  $164.99
$50  $124.99
$42  $104.99
buy now 312-76