Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil EDRP 312-76 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 312-76 Premium Access

View all detail and faqs for the 312-76 exam


461 Students Passed

91% Average Score

95% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

A hospital was upgrading its records to a digital form. In the process, it was also moving from manual processes in the emergency room to automated online processes. Since this information was extremely vital and could not be unavailable for even minutes, the IT department proposed a solution that would address this need. In the proposed system, a secondary server would take over the primary one automatically the second the primary server goes down for any reason. This required the two servers to be in coordination at all times. Which solution is the IT department proposing?

Options:

A.

Database Replication

B.

Failover

C.

Deduplication

D.

Point in Time Recovery

Questions # 2:

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

Options:

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Questions # 3:

Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?

Options:

A.

Business Impact Analysis

B.

Risk Mitigation

C.

Mission Essential Functions (MEF)

D.

Maximum Allowed Downtime (MAD)

Questions # 4:

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

Options:

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Questions # 5:

Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?

Options:

A.

Survivable Storage System

B.

Decentralized Computing

C.

Mirroring

D.

Mainframe Computer System

Questions # 6:

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

Options:

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Questions # 7:

Gloria was auditing the BCP prepared by one of her clients. The BCP audit stage that she was currently examining ascertained whether operational resiliency and continuity was being encouraged, and if the BCP was overfunded or underfunded. Which BCP audit stage was Gloria examining?

Options:

A.

Ongoing Program Management

B.

Overall Program Governance

C.

Management of Process Changes

D.

Overall Testing of the Plan

Questions # 8:

What is the main objective of a BC test plan?

Options:

A.

To demonstrate proficiency in management response and crisis conditions

B.

To ensure the plan is accurate and relevant under adverse circumstances

C.

To diverge from the test storyboard to include unplanned events or circumstances

D.

Not threaten the normal business operations of an organization

Questions # 9:

Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?

Options:

A.

Full Backup

B.

Normal Backup

C.

Incremental Backup

D.

Differential Backup

Questions # 10:

Which of the following terms refers to the blueprint that calls out the tactics, which eventually dictate how continuity and recovery from a disaster will be achieved?

Options:

A.

Business Continuity Management

B.

Crisis Management

C.

Business Continuity Plan

D.

Business Continuity Strategy

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.