Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

312-76 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

312-76 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)
  • Last Update: May 15, 2025
  • Questions and Answers: 150
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

312-76 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

312-76 Practice Exam Questions with Answers EC-Council Disaster Recovery Professional v3 (EDRP) Certification

Question # 6

Lisa’s organization has multiple servers to cater to the needs of different businesses and clients. Each of these servers runs different applications in order to keep them isolated from each other. The server room incurs a huge cost because of the number of servers owing to the massive cooling systems, server maintenance, data center footprint, and quicker server provisioning. An audit of the resources discovered that most of the servers are idle two-thirds of business hours since these servers are dedicated towards faster recovery during disasters and the isolation of applications. Lisa is looking for a solution to bring down the cost of maintaining these servers, optimize the use of resources, and save money on the energy spent to keep these servers cool. Which solution can meet all these needs of Lisa?

A.

Virtual Desktop Infrastructure

B.

Operating System Virtualization

C.

Server Replication

D.

Server Virtualization

Full Access
Question # 7

Joan was conducting a particular disaster recovery test in her startup. In this test, the effectiveness, bottlenecks, or any weaknesses in the plan had to be confirmed by the team members. Which test was Joan conducting?

A.

Walkthrough Testing

B.

Full Interruption Testing

C.

Parallel Testing

D.

Simulation Testing

Full Access
Question # 8

Alan wants to start backing up the news articles his team generates every day. Usually, his team churns out three or four articles daily. Since the time taken to back up the articles is essentially a downtime forthe team, he does not want the backing up process to be too time-consuming. Which of the following backups would suit Alan’s needs?

A.

Incremental Backup

B.

Differential Backup

C.

Full System Backup

D.

Online Data Backup

Full Access
Question # 9

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Full Access
Question # 10

When information confidentiality increases in PASIS architecture, what else also increases as a direct result?

A.

Reaction

B.

Latency

C.

Storage Requirement

D.

Durability

Full Access
Question # 11

Jack updated the operating system of his MacBook to the latest beta version. A few hours later, while working on his MacBook, Jack discovers that some of his installed applications are not working properly, and this may be due to the bug-ridden beta update. Hence, he decides to restore his MacBook to the previous OS version. Which MacBook feature should Jack be using in this scenario?

A.

Time Shift

B.

Image Recovery

C.

Snapshots

D.

Time Machine

Full Access
Question # 12

What is the name of the shared directory in the Microsoft Server OS, which contains the copy of commonly shared and replicated public files of that particular domain?

A.

ADFS

B.

SYSVOL

C.

inetpub

D.

Public Files

Full Access
Question # 13

Which of the following technical processes provides additional security to virtual machines by disabling unnecessary interfaces, devices, ports, and services?

A.

Restriction of Physical Access

B.

Defense-in-Depth

C.

Isolation of Security Functions

D.

Hardening

Full Access
Question # 14

Which of the following terms refers to the backing up of files that have been modified, changed, or have been added since the last full backup?

A.

Differential Backup

B.

Full System Backup

C.

Incremental Backup

D.

Online Data Backup

Full Access
Question # 15

Which of the following is NOT an advantage of colocation facilities?

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Full Access
Question # 16

Which of the following terms refers to third-party backup, and offsite replication?

A.

Continuous Data Protection

B.

Managed Disaster Recovery

C.

Tape Vaulting

D.

Disk Shadowing

Full Access
Question # 17

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Full Access
Question # 18

Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?

A.

DAS

B.

NAS

C.

PAS

D.

RAID

Full Access
Question # 19

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Full Access
Question # 20

An online betting site accepts bets for sporting events held around the world. Due to this, their operations need to be up 24x7. During an internal IT audit, they discovered a vulnerability in their payment gateway system. They assessed that should the payment gateway go down for more than an hour, they will lose about $100,000 and about 15% of their customers to their competitor website. Moreover, they might lose 25% of their customer base permanently due to the constant promotions run by their competitor to attract and retain new customers. This was unacceptable for the business under any circumstances, so immediate corrective measures were taken to fix the vulnerability. What technical term best defines this time period of two hours?

A.

Recovery Point Objective (RPO)

B.

Maximum Tolerable Period of Disruption (MTPOD)

C.

Recovery Time Objective (RTO)

D.

Work Recovery Time (WRT)

Full Access
Question # 21

Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?

A.

Functional Test

B.

Simulation Test

C.

Checklist Test

D.

Orientation Test

Full Access
Question # 22

Richard was a cautious person, and he used to back up his organization’s data daily at 8:00 pm. One day, due to a fire in his office building at 9:00 am, servers containing critical data were destroyed. It would take about 8 hours for Richard’s organization to transfer the backed-up data from the alternate site to the primary site. Based on the last data backup, the recovery time in this scenario is ‘minus 13 hours’. What technical term best defines this time period of 13 hours?

A.

Recovery Time Objective (RTO)

B.

Maximum Acceptable Outage (MAO)

C.

Recovery Point Objective (RPO)

D.

Single Point of Failure (SPOF)

Full Access
Question # 23

Which of the following terms refers to a holistic management process that identifies potential threats to an organization and its impacts on business operations? It further provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand, and value-creating activities?

A.

Business Impact Analysis

B.

Risk Management

C.

Business Continuity Management

D.

Disaster Recovery

Full Access
Question # 24

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Full Access
Question # 25

A few days after Fred launched his new website online, he discovers that the site is not accessible. Upon investigation, he learns that some of the hosting files on the server have been corrupted. Which of the following servers would Fred have to restore to get his site back up?

A.

Application Server

B.

IIS Server

C.

Database Server

D.

Catalog Server

Full Access
Question # 26

Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?

A.

NFPA 1600

B.

ISO 27005

C.

INCITS 483-2012

D.

ISO 27031

Full Access
Question # 27

Max and Carl, two partners in an organization, are considering whether to implement a standard that provides a framework of methods and processes to identify and specify all aspects for improving an organization’s ICT readiness to ensure business continuity. Which standard are Max and Carl discussing?

A.

ISO 27031

B.

ISO 27005

C.

ISO 22313

D.

INCITS 483-2012

Full Access
Question # 28

Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?

A.

Survivable Storage System

B.

Decentralized Computing

C.

Mirroring

D.

Mainframe Computer System

Full Access
Question # 29

What is the main objective of a BC test plan?

A.

To demonstrate proficiency in management response and crisis conditions

B.

To ensure the plan is accurate and relevant under adverse circumstances

C.

To diverge from the test storyboard to include unplanned events or circumstances

D.

Not threaten the normal business operations of an organization

Full Access
Question # 30

Which of the following terms refers to a programming pattern in which computers are clustered together in a distributed and parallel fashion?

A.

Decentralized Computing

B.

Grid Computing

C.

Cloud Computing

D.

Centralized Computing

Full Access
Question # 31

Which of the following disaster recovery tiers makes use of point-in-time copies?

A.

Tier 4

B.

Tier 5

C.

Tier 0

D.

Tier 6

Full Access
Question # 32

John wanted to transfer his organization’s data to an alternate site. He wanted the alternate site to run in parallel to the primary site, which would allow his organization to continue normal business operations almost immediately in the event of a disruption. Which of the following sites is best suited to John’s requirements?

A.

Cold Site

B.

Warm Site

C.

Hot Site

D.

Colocation Facilities

Full Access
Question # 33

Which of the following terms refers to a storage system that consists of hard disk drives (HDDs) that look and act like a physical tape library?

A.

Virtual Tape Library (VTL)

B.

Mirroring

C.

Disk-to-Disk (D2D)

D.

Snapshot

Full Access
Question # 34

Which of the following terms refers to the act, manner, or practice of an organization to bring systems, applications, and data back to "normal" conditions in a prescribed and acceptable time frame?

A.

Disaster Recovery Management

B.

Business Continuity Management (BCM)

C.

Risk Management

D.

Recovery Management

Full Access
Question # 35

To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?

A.

Near-line

B.

Onsite

C.

Online

D.

Offsite

Full Access
Question # 36

Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?

A.

Three Tier

B.

Client-Server

C.

Peer-to-Peer

D.

N-Tier

Full Access
Question # 37

Gloria was auditing the BCP prepared by one of her clients. The BCP audit stage that she was currently examining ascertained whether operational resiliency and continuity was being encouraged, and if the BCP was overfunded or underfunded. Which BCP audit stage was Gloria examining?

A.

Ongoing Program Management

B.

Overall Program Governance

C.

Management of Process Changes

D.

Overall Testing of the Plan

Full Access
Question # 38

Matt is unable to boot his Windows Server 2012 system after an OS update. He later finds out that some of the important files of the boot manager are corrupted and that led to boot manager failure. However, he tries to recover the boot manager using the Command Prompt present in the System Recovery option. Which Command Prompt command should Matt use in this scenario?

A.

sfc /scannow

B.

ntdsutil

C.

Bootrec /RebuildBCD

D.

repadmin /showrepl

Full Access
Question # 39

ABC Inc. has a host of servers, each serving a different purpose. Almost all of them are critical to the functioning of the business. Most of the servers were virtualized and had backup virtual components. Thus, when the memory of one server crashed in the middle of a busy business day, it did not affect the operations as the server quickly switched to a different virtual memory, which was kept as a backup for this purpose precisely. What is such a feature called?

A.

Deduplication

B.

High Availability

C.

Fault Tolerance

D.

Mirroring

Full Access
Question # 40

The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?

A.

Merge Replication

B.

Transactional Replication

C.

SQL Server Replication

D.

Snapshot Replication

Full Access
Question # 41

Which layer of the Recovery Management Model would provide hassle-free recovery of systems in case of a disaster and would enable the control of data protection technologies such as replication and backup?

A.

Protection Technologies Layer

B.

Testing Simulation Layer

C.

Common Management Layer

D.

Analytics and Reporting Layer

Full Access
Question # 42

Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?

A.

Optical Media Storage

B.

On-Premise Disk-Based Archiving

C.

Legacy Archiving

D.

Cloud-Based Archiving

Full Access
Question # 43

Which of the following services provides mail and calendar services?

A.

Application Server

B.

Web Server

C.

Exchange Server

D.

Domain Controller

Full Access
Question # 44

Which of the following terms refers to the training milestones that must be achieved in order to meet the BC training program’s aim?

A.

Time-Related Objectives

B.

Development Objectives

C.

Routine Objectives

D.

Terminal Objectives

Full Access
Question # 45

Which of the following is not an objective of business impact analysis?

A.

Assess the Impact Caused by a Threat

B.

Identify the Critical Resources Required by the Business

C.

Establish the Recovery Order of the Critical Business Functions

D.

Identify RTO and RPO for Each Process

Full Access