Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ECCouncil > Certified Ethical Hacker > 312-76

312-76 EC-Council Disaster Recovery Professional v3 (EDRP) Question and Answers

Question # 4

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

A.

Disaster Management Team

B.

Disaster Management Executive Committee

C.

Disaster Management Team Chairpersons

D.

Disaster Management Team Coordinators

Full Access
Question # 5

XYZ Inc. has set up an FTP server between its primary site of business and its backup site. Jennifer, the IT administrator, is charged with transferring all the critical data to the backup site via this FTP server. Which of the following terms best describes the process?

A.

Electronic Vaulting

B.

Disk Duplexing

C.

Disk Shadowing

D.

Manually copying the data files and transferring them to the remote site

Full Access
Question # 6

Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?

A.

Data Recovery

B.

Disaster Recovery

C.

Application Recovery

D.

Recovery Management

Full Access
Question # 7

In which scenario training phase is a debrief conducted with the participants to obtain more feedback?

A.

Execution Phase

B.

Review Phase

C.

Warning Phase

D.

Planning Phase

Full Access
Question # 8

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Full Access
Question # 9

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

A.

Recovery Consistency Objective (RCO)

B.

Recovery Object Granularity (ROG)

C.

Recovery Location Scope (RLS)

D.

Recovery Service Resiliency (RSR)

Full Access
Question # 10

Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?

A.

Domain Controller Servers

B.

IIS Servers

C.

File Servers

D.

Global Catalog Servers

Full Access
Question # 11

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Full Access
Question # 12

John wanted to transfer his organization’s data to an alternate site. He wanted the alternate site to run in parallel to the primary site, which would allow his organization to continue normal business operations almost immediately in the event of a disruption. Which of the following sites is best suited to John’s requirements?

A.

Cold Site

B.

Warm Site

C.

Hot Site

D.

Colocation Facilities

Full Access
Question # 13

The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?

A.

Merge Replication

B.

Transactional Replication

C.

SQL Server Replication

D.

Snapshot Replication

Full Access
Question # 14

Katie was setting up disaster recovery teams in her organization to combat any disaster that occurred. One of the most important teams was the disaster recovery coordinator. Having two names in mind for the post, Katie interviewed the two people for the roles and responsibilities of the disaster recovery coordinator. Which of the following statements should either of the interviewees use to get the post?

A.

Responsible for disaster recovery planning verification and compliance

B.

Day-to-day management control over the execution and maintenance of the disaster recovery program

C.

Responsible for the specification and design of all technology-based disaster recovery solutions

D.

Executive authority over the disaster recovery program

Full Access
Question # 15

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Full Access
Question # 16

Oliver’s team had been working hard on a proposal for a new project. After meticulously working out the details for a month, they found out that someone had leaked their proposal to their competitor and they had lost the project. This impacted their morale hugely, and for the next two months, all the other projects progressed extremely slowly resulting in their delay. Which of the following best describes the impact that this data breach had on the organization?

A.

Semi-Qualitative Impact

B.

Qualitative Impact

C.

Quantitative Impact

D.

Industrial Impact

Full Access
Question # 17

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Full Access
Question # 18

Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?

A.

Business Impact Analysis

B.

Opportunity Cost

C.

Fixed Cost

D.

Cost Benefit Analysis

Full Access
Question # 19

Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?

A.

Simulation Test

B.

Orientation Test

C.

Checklist Test

D.

Tabletop Test

Full Access
Question # 20

Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?

A.

Database Authentication

B.

Database Consolidation

C.

Database Integrity Testing

D.

Backup Integrity Testing

Full Access
Question # 21

James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?

A.

Risk Adjusted Return on Capital (RAROC)

B.

Risk Adjusted Performance Management (RAPM)

C.

Risk Adjusted Return on Risk Adjusted Capital (RARORAC)

D.

Return on Risk Adjusted Capital (RORAC)

Full Access
Question # 22

Jack is a system administrator working in a data center, which operates thousands of virtual servers running on Microsoft’s virtualization platform, Hyper-V. Jack’s manager advises him to take a snapshot backup instead of a full backup of the virtual machines running on Hyper-V to save the backup time. Which native feature present in Hyper-V Manager should he use in this scenario?

A.

System Backup

B.

Checkpoint Backup

C.

Snapshots Backup

D.

Hyper-V Replication

Full Access
Question # 23

Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?

A.

Operations Team

B.

Support Team

C.

Planning Team

D.

Technology Team

Full Access
Question # 24

Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?

A.

Prevention

B.

Backup

C.

Recovery

D.

Resumption

Full Access
Question # 25

To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?

A.

ISO 27001

B.

INCITS 483-2012

C.

ISO 27031

D.

ISO/IEC 27005

Full Access
Question # 26

Which of the following services provides mail and calendar services?

A.

Application Server

B.

Web Server

C.

Exchange Server

D.

Domain Controller

Full Access
Question # 27

Which of the following terms refers to the backing up of files that have been modified, changed, or have been added since the last full backup?

A.

Differential Backup

B.

Full System Backup

C.

Incremental Backup

D.

Online Data Backup

Full Access
Question # 28

Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?

A.

Cloud Backup

B.

Disk Imaging

C.

Visualization

D.

Bare-metal Restore

Full Access
Question # 29

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Full Access
Question # 30

Which of the following terms defines the assessment of the risk factors and the relationship that exists between these factors?

A.

Risk Models

B.

Risk Management

C.

Risk Mitigation

D.

Risk Assessment

Full Access
Question # 31

Which of the following terms refers to a storage system that consists of hard disk drives (HDDs) that look and act like a physical tape library?

A.

Virtual Tape Library (VTL)

B.

Mirroring

C.

Disk-to-Disk (D2D)

D.

Snapshot

Full Access
Question # 32

Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?

A.

Risk Management

B.

Business Impact Analysis

C.

Risk Assessment

D.

Vulnerability Assessment

Full Access
Question # 33

Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?

A.

Differential Backup

B.

Online Data Backup

C.

Incremental Backup

D.

Full System Backup

Full Access
Question # 34

Which of the following is also known as the doomsday recovery level in 3DR?

A.

Local Data Protection

B.

Archiving of Data

C.

Backup of Data

D.

Remote Backup of Data Protection

Full Access
Question # 35

Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?

A.

Delete the child disk of the snapshots present in the host machine

B.

Delete the virtual machine database

C.

Uninstall the Hypervisor

D.

Shut down or restart the virtual machine system

Full Access
Question # 36

James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?

A.

Logical

B.

Natural Disaster

C.

Physical

D.

Data Corruption

Full Access
Question # 37

Which of the following options must be considered by an organization when conducting BIA?

A.

Transferring a business activity to a third-party

B.

Ceasing or changing a business activity if viable alternatives are available

C.

Time scales for assessment

D.

Establishing alternate processes or creating redundancy/spare capacity in processes

Full Access
Question # 38

Jake was preparing a particular plan for his organization in which all personnel accountable for research, development, and implementation of the disaster recovery plan were being identified. Which plan was Jake preparing for his organization?

A.

Business Continuity Plan

B.

Disaster Management Plan

C.

IT Recovery Plan

D.

Disaster Recovery Plan

Full Access
Question # 39

Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?

A.

Functional Test

B.

Simulation Test

C.

Checklist Test

D.

Orientation Test

Full Access
Question # 40

Emma was conducting scenario training in her organization. In the training phase that was currently being conducted, the participants were well informed in advance about the training taking place. Which training phase was currently being conducted?

A.

Warning Phase

B.

Review Phase

C.

Planning Phase

D.

Execution Phase

Full Access
Question # 41

Match the following RAID components with their functions:

A.

l-ii.2-i.3-iv.4-iii

B.

l-v,2-iv,3-ii, A-ii

C.

l-iii,2-v3-i,4-iv

D.

l-iv.2-iii,3-v,4-i

Full Access
Question # 42

Which of the following terms refers to a backup that is taken when the database is offline?

A.

Online Data Backup

B.

Hot Backup

C.

Full System Backup

D.

Cold Backup

Full Access
Question # 43

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Full Access
Question # 44

Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?

A.

#backup running-configuration ftp

B.

#backup running-configuration ftp

C.

#copy running-configuration ftp

D.

#copy running-configuration tftp

Full Access
Question # 45

Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?

A.

Mirroring

B.

Deduplication

C.

Failover

D.

Server Clustering

Full Access