Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

EC-Council Disaster Recovery Professional v3 (EDRP) Question and Answers

EC-Council Disaster Recovery Professional v3 (EDRP)

Last Update Nov 30, 2025
Total Questions : 150

We are offering FREE 312-76 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-76 free exam questions and then go for complete pool of EC-Council Disaster Recovery Professional v3 (EDRP) test questions that will help you more.

312-76 pdf

312-76 PDF

$36.75  $104.99
312-76 Engine

312-76 Testing Engine

$43.75  $124.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$57.75  $164.99
Questions 1

Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?

Options:

A.  

#backup running-configuration ftp

B.  

#backup running-configuration ftp

C.  

#copy running-configuration ftp

D.  

#copy running-configuration tftp

Discussion 0
Questions 2

Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?

Options:

A.  

Transparency

B.  

Openness

C.  

Scalability

D.  

Monotonicity

Discussion 0
Questions 3

Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?

Options:

A.  

Availability

B.  

Integrity

C.  

Nonrepudiation

D.  

Precaution

Discussion 0
Questions 4

Which of the following terms refers to a dedicated server that is also used for file storage and sharing?

Options:

A.  

Data Virtualization

B.  

Cloud Storage

C.  

Storage Area Network (SAN)

D.  

Network Attached Storage (NAS)

Discussion 0
Questions 5

Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?

Options:

A.  

Prevention

B.  

Backup

C.  

Recovery

D.  

Resumption

Discussion 0
Questions 6

To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?

Options:

A.  

Near-line

B.  

Onsite

C.  

Online

D.  

Offsite

Discussion 0
Questions 7

XYZ Inc. has set up an FTP server between its primary site of business and its backup site. Jennifer, the IT administrator, is charged with transferring all the critical data to the backup site via this FTP server. Which of the following terms best describes the process?

Options:

A.  

Electronic Vaulting

B.  

Disk Duplexing

C.  

Disk Shadowing

D.  

Manually copying the data files and transferring them to the remote site

Discussion 0
Questions 8

Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?

Options:

A.  

Domain Controller Servers

B.  

IIS Servers

C.  

File Servers

D.  

Global Catalog Servers

Discussion 0
Questions 9

Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?

Options:

A.  

Business Impact Analysis

B.  

Opportunity Cost

C.  

Fixed Cost

D.  

Cost Benefit Analysis

Discussion 0
Questions 10

Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?

Options:

A.  

Differential Backup

B.  

Online Data Backup

C.  

Incremental Backup

D.  

Full System Backup

Discussion 0
Questions 11

Which of the following terms refers to a client-server architecture that is merged with layered architecture?

Options:

A.  

N-Tier Architecture

B.  

Application Server-Tier Architecture

C.  

Client-Server Architecture

D.  

Tightly Coupled Architecture

Discussion 0
Questions 12

Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?

Options:

A.  

Server Migration

B.  

Data Replication

C.  

Authoritative Active Directory Restoration

D.  

Non-Authoritative Active Directory Restoration

Discussion 0
Questions 13

The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?

Options:

A.  

Merge Replication

B.  

Transactional Replication

C.  

SQL Server Replication

D.  

Snapshot Replication

Discussion 0
Questions 14

Fred identified that his organization was vulnerable to mainly two risks:

a. One was a sudden power outage that could damage critical data.

b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.

To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?

Options:

A.  

Risk Assessment

B.  

Risk Management

C.  

Risk Identification

D.  

Risk Mitigation

Discussion 0
Questions 15

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

Options:

A.  

Hot Sites

B.  

Cold Sites

C.  

Warm Sites

D.  

Colocation Facilities

Discussion 0
Questions 16

Which of the following options must be considered by an organization when conducting BIA?

Options:

A.  

Transferring a business activity to a third-party

B.  

Ceasing or changing a business activity if viable alternatives are available

C.  

Time scales for assessment

D.  

Establishing alternate processes or creating redundancy/spare capacity in processes

Discussion 0
Questions 17

After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?

Options:

A.  

Durability

B.  

Availability

C.  

Reaction

D.  

Integrity

Discussion 0
Questions 18

Which of the following terms refers to a high-speed data transmission technique that provides access to consolidated block-level storage?

Options:

A.  

Cloud Storage

B.  

Network Attached Storage (NAS)

C.  

Storage Virtualization

D.  

Storage Area Network (SAN)

Discussion 0
Questions 19

Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?

Options:

A.  

Quantitative Risk Assessment

B.  

Qualitative Risk Assessment

C.  

Semi-Qualitative Risk Assessment

D.  

Semi-Quantitative Risk Assessment

Discussion 0
Questions 20

James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?

Options:

A.  

Risk Adjusted Return on Capital (RAROC)

B.  

Risk Adjusted Performance Management (RAPM)

C.  

Risk Adjusted Return on Risk Adjusted Capital (RARORAC)

D.  

Return on Risk Adjusted Capital (RORAC)

Discussion 0
Questions 21

Fred, the owner of an organization, wanted to implement a plan that consists of well-planned actions to be adopted before, during, and after a catastrophic event. Which plan did Fred want to implement?

Options:

A.  

Business Recovery Plan

B.  

Risk Assessment

C.  

IT Disaster Recovery Plan

D.  

Data Backup Plan

Discussion 0
Questions 22

Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?

Options:

A.  

Windows Server Backup, Microsoft Management Console

B.  

Windows Server Backup, Administrative Tools

C.  

Server Migration, Microsoft Management Console

D.  

Server Migration, Administrative Tools

Discussion 0
Questions 23

Which of the following terms measures the severity of the impact of a risk on a business?

Options:

A.  

Recovery Time

B.  

Frequency

C.  

Recovery Scale

D.  

Assessment Scale

Discussion 0
Questions 24

Which of the following terms refers to any circumstance with the potential to disrupt or degrade the quality of operations or assets?

Options:

A.  

Impact

B.  

Vulnerability

C.  

Hazard

D.  

Threat

Discussion 0
Questions 25

Oliver’s team had been working hard on a proposal for a new project. After meticulously working out the details for a month, they found out that someone had leaked their proposal to their competitor and they had lost the project. This impacted their morale hugely, and for the next two months, all the other projects progressed extremely slowly resulting in their delay. Which of the following best describes the impact that this data breach had on the organization?

Options:

A.  

Semi-Qualitative Impact

B.  

Qualitative Impact

C.  

Quantitative Impact

D.  

Industrial Impact

Discussion 0
Questions 26

Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?

Options:

A.  

Operations Team

B.  

Support Team

C.  

Planning Team

D.  

Technology Team

Discussion 0
Questions 27

Matt is the security advisor for a global online stock brokering organization. He wants to back up his organization’s critical data but is faced with a challenge. Due to the real-time data updating nature of his organization’s business, he cannot have any downtime for his systems to back them up. Which of the following backup techniques can help Matt overcome this challenge?

Options:

A.  

Incremental Backup

B.  

Cold Backup

C.  

Hot Backup

D.  

Online Data Backup

Discussion 0
Questions 28

Which of the following terms refers to the blueprint that calls out the tactics, which eventually dictate how continuity and recovery from a disaster will be achieved?

Options:

A.  

Business Continuity Management

B.  

Crisis Management

C.  

Business Continuity Plan

D.  

Business Continuity Strategy

Discussion 0
Questions 29

Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?

Options:

A.  

Risk Management

B.  

Business Impact Analysis

C.  

Risk Assessment

D.  

Vulnerability Assessment

Discussion 0
Questions 30

Amy was conducting a disaster recovery test at her clinic. In this test scenario, a real-life disaster was mimicked, and important aspects such as software, communication, procedures, and personnel were tested. Which test was Amy conducting?

Options:

A.  

Walkthrough Testing

B.  

Parallel Testing

C.  

Full Interruption Testing

D.  

Simulation Testing

Discussion 0
Questions 31

Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?

Options:

A.  

NFPA 1600

B.  

ISO 27005

C.  

INCITS 483-2012

D.  

ISO 27031

Discussion 0
Questions 32

Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?

Options:

A.  

Three Tier

B.  

Client-Server

C.  

Peer-to-Peer

D.  

N-Tier

Discussion 0
Questions 33

Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?

Options:

A.  

Delete the child disk of the snapshots present in the host machine

B.  

Delete the virtual machine database

C.  

Uninstall the Hypervisor

D.  

Shut down or restart the virtual machine system

Discussion 0
Questions 34

In which of the following tests is the entire BCP implemented?

Options:

A.  

Orientation Test

B.  

Functional Test

C.  

Full-Scale Test

D.  

Simulation Test

Discussion 0
Questions 35

A hospital was upgrading its records to a digital form. In the process, it was also moving from manual processes in the emergency room to automated online processes. Since this information was extremely vital and could not be unavailable for even minutes, the IT department proposed a solution that would address this need. In the proposed system, a secondary server would take over the primary one automatically the second the primary server goes down for any reason. This required the two servers to be in coordination at all times. Which solution is the IT department proposing?

Options:

A.  

Database Replication

B.  

Failover

C.  

Deduplication

D.  

Point in Time Recovery

Discussion 0
Questions 36

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

Options:

A.  

Disaster Management Team

B.  

Disaster Management Executive Committee

C.  

Disaster Management Team Chairpersons

D.  

Disaster Management Team Coordinators

Discussion 0
Questions 37

Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?

Options:

A.  

Cloud-based Storage

B.  

Virtual Machines

C.  

Software Defined Data Center

D.  

Data Virtualization

Discussion 0
Questions 38

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

Options:

A.  

Detailed Awareness Training

B.  

Simulation Training

C.  

Scenario Training

D.  

Introductory Awareness Training

Discussion 0
Questions 39

Phil, an entrepreneur, is running an important experiment on a virtual machine that may give him a breakthrough in the research for his next product. Unfortunately, while the experiment was being conducted, the virtual machine crashed. Fortunately, Phil had implemented a method that took a backup of the machine at regular intervals and would provide an architectural instance of the last saved version of the virtual machine. Which backup method did Phil implement?

Options:

A.  

Snapshot

B.  

Mirroring

C.  

Continuous Data Protection (CDP)

D.  

Disk-to-Disk (D2D)

Discussion 0
Questions 40

Jack is a system administrator working in a data center, which operates thousands of virtual servers running on Microsoft’s virtualization platform, Hyper-V. Jack’s manager advises him to take a snapshot backup instead of a full backup of the virtual machines running on Hyper-V to save the backup time. Which native feature present in Hyper-V Manager should he use in this scenario?

Options:

A.  

System Backup

B.  

Checkpoint Backup

C.  

Snapshots Backup

D.  

Hyper-V Replication

Discussion 0
Questions 41

Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?

Options:

A.  

Mirroring

B.  

Virtualization

C.  

Deduplication

D.  

Snapshot

Discussion 0
Questions 42

Which disaster recovery plan is very expensive and disrupts normal business operations?

Options:

A.  

Full Interruption Testing

B.  

Simulation Testing

C.  

Parallel Testing

D.  

Checklist Testing

Discussion 0
Questions 43

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

Options:

A.  

Continuous Data Protection (CDP)

B.  

Mirroring

C.  

Virtual Tape Library (VTL)

D.  

Disk-to-Disk (D2D)

Discussion 0
Questions 44

Which of the following refers to a moveable operating environment that can be set up or installed at any place on transportable units?

Options:

A.  

Mobile Recovery Center

B.  

Crisis Command Center

C.  

Cold Site

D.  

Colocation Facilities

Discussion 0
Questions 45

Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?

Options:

A.  

Data Recovery

B.  

Disaster Recovery

C.  

Application Recovery

D.  

Recovery Management

Discussion 0