Pass the ECCouncil EDRP 312-76 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following terms refers to the blueprint that calls out the tactics, which eventually dictate how continuity and recovery from a disaster will be achieved?

Options:

A.

Business Continuity Management


B.

Crisis Management


C.

Business Continuity Plan


D.

Business Continuity Strategy


Expert Solution
Questions # 12:

Which of the following three components define the three-tier architecture in decentralized computing?

Options:

A.

Tightly Coupled, Client, and Peer-to-Peer


B.

Client, Peer-to-Peer, and Application


C.

Application, Peer-to-Peer, and Tightly Coupled


D.

Client, Application Server, and Database Server


Expert Solution
Questions # 13:

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

Options:

A.

Recovery Consistency Objective (RCO)


B.

Recovery Object Granularity (ROG)


C.

Recovery Location Scope (RLS)


D.

Recovery Service Resiliency (RSR)


Expert Solution
Questions # 14:

Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?

Options:

A.

NFPA 1600


B.

ISO 27005


C.

INCITS 483-2012


D.

ISO 27031


Expert Solution
Questions # 15:

Jack was setting up BCP training for those employees in the organization who did not have a large role to play in the execution of the BCP. This training consisted of the framework, processes, and strategies involved in the plan. What is this training known as?

Options:

A.

Introductory Awareness Training


B.

Simulation Training


C.

Scenario Training


D.

Detailed Awareness Training


Expert Solution
Questions # 16:

XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?

Options:

A.

High-Availability


B.

Global Load Balancing


C.

Failover


D.

Network Load Balancing


Expert Solution
Questions # 17:

Which of the following terms refers to third-party backup, and offsite replication?

Options:

A.

Continuous Data Protection


B.

Managed Disaster Recovery


C.

Tape Vaulting


D.

Disk Shadowing


Expert Solution
Questions # 18:

Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?

Options:

A.

Server Migration


B.

Data Replication


C.

Authoritative Active Directory Restoration


D.

Non-Authoritative Active Directory Restoration


Expert Solution
Questions # 19:

Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?

Options:

A.

Risk Management


B.

Business Impact Analysis


C.

Risk Assessment


D.

Vulnerability Assessment


Expert Solution
Questions # 20:

Which of the following virtualization methods requires a software called containers or virtual engines to run?

Options:

A.

Data Virtualization


B.

Network Virtualization


C.

Desktop Virtualization


D.

OS-Based Virtualization


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions