EC-Council Disaster Recovery Professional v3 (EDRP)
Last Update Nov 30, 2025
Total Questions : 150
We are offering FREE 312-76 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-76 free exam questions and then go for complete pool of EC-Council Disaster Recovery Professional v3 (EDRP) test questions that will help you more.
Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?
Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?
Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?
Which of the following terms refers to a dedicated server that is also used for file storage and sharing?
Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?
To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?
XYZ Inc. has set up an FTP server between its primary site of business and its backup site. Jennifer, the IT administrator, is charged with transferring all the critical data to the backup site via this FTP server. Which of the following terms best describes the process?
Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?
Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?
Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?
Which of the following terms refers to a client-server architecture that is merged with layered architecture?
Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?
The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?
Fred identified that his organization was vulnerable to mainly two risks:
a. One was a sudden power outage that could damage critical data.
b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.
To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?
Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?
Which of the following options must be considered by an organization when conducting BIA?
After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?
Which of the following terms refers to a high-speed data transmission technique that provides access to consolidated block-level storage?
Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?
James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?
Fred, the owner of an organization, wanted to implement a plan that consists of well-planned actions to be adopted before, during, and after a catastrophic event. Which plan did Fred want to implement?
Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?
Which of the following terms measures the severity of the impact of a risk on a business?
Which of the following terms refers to any circumstance with the potential to disrupt or degrade the quality of operations or assets?
Oliver’s team had been working hard on a proposal for a new project. After meticulously working out the details for a month, they found out that someone had leaked their proposal to their competitor and they had lost the project. This impacted their morale hugely, and for the next two months, all the other projects progressed extremely slowly resulting in their delay. Which of the following best describes the impact that this data breach had on the organization?
Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?
Matt is the security advisor for a global online stock brokering organization. He wants to back up his organization’s critical data but is faced with a challenge. Due to the real-time data updating nature of his organization’s business, he cannot have any downtime for his systems to back them up. Which of the following backup techniques can help Matt overcome this challenge?
Which of the following terms refers to the blueprint that calls out the tactics, which eventually dictate how continuity and recovery from a disaster will be achieved?
Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?
Amy was conducting a disaster recovery test at her clinic. In this test scenario, a real-life disaster was mimicked, and important aspects such as software, communication, procedures, and personnel were tested. Which test was Amy conducting?
Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?
Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?
Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?
A hospital was upgrading its records to a digital form. In the process, it was also moving from manual processes in the emergency room to automated online processes. Since this information was extremely vital and could not be unavailable for even minutes, the IT department proposed a solution that would address this need. In the proposed system, a secondary server would take over the primary one automatically the second the primary server goes down for any reason. This required the two servers to be in coordination at all times. Which solution is the IT department proposing?
Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?
Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?
Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?
Phil, an entrepreneur, is running an important experiment on a virtual machine that may give him a breakthrough in the research for his next product. Unfortunately, while the experiment was being conducted, the virtual machine crashed. Fortunately, Phil had implemented a method that took a backup of the machine at regular intervals and would provide an architectural instance of the last saved version of the virtual machine. Which backup method did Phil implement?
Jack is a system administrator working in a data center, which operates thousands of virtual servers running on Microsoft’s virtualization platform, Hyper-V. Jack’s manager advises him to take a snapshot backup instead of a full backup of the virtual machines running on Hyper-V to save the backup time. Which native feature present in Hyper-V Manager should he use in this scenario?
Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?
Which disaster recovery plan is very expensive and disrupts normal business operations?
Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?
Which of the following refers to a moveable operating environment that can be set up or installed at any place on transportable units?
Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?