Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 5
Total 45 questions
Exam Code: 312-76                Update: Oct 15, 2025
Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)

ECCouncil EC-Council Disaster Recovery Professional v3 (EDRP) 312-76 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?

A.

Cloud Backup

B.

Disk Imaging

C.

Visualization

D.

Bare-metal Restore

Question # 2

Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?

A.

Continuous Data Protection (CDP)

B.

Mirroring

C.

Virtual Tape Library (VTL)

D.

Disk-to-Disk (D2D)

Question # 3

XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?

A.

Work Recovery Time (WRT)

B.

Recovery Time Objective (RTO)

C.

Maximum Tolerable Downtime (MTD)

D.

Recovery Point Objective (RPO)

Question # 4

Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?

A.

Server Migration

B.

Data Replication

C.

Authoritative Active Directory Restoration

D.

Non-Authoritative Active Directory Restoration

Question # 5

Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?

A.

Improve the performance of the network storage

B.

Increase the bandwidth of the network connection

C.

Update the NIC driver

D.

None of these

Question # 6

Which of the following is not an objective of business impact analysis?

A.

Assess the Impact Caused by a Threat

B.

Identify the Critical Resources Required by the Business

C.

Establish the Recovery Order of the Critical Business Functions

D.

Identify RTO and RPO for Each Process

Question # 7

Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?

A.

Survivable Storage System

B.

Decentralized Computing

C.

Mirroring

D.

Mainframe Computer System

Question # 8

Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?

A.

Quantitative Risk Assessment

B.

Qualitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Semi-Quantitative Risk Assessment

Question # 9

Which of the following is a feature of mainframe computers?

A.

Proven Reliability

B.

Openness

C.

Pluralism

D.

Transparency

Question # 10

Fred identified that his organization was vulnerable to mainly two risks:

a. One was a sudden power outage that could damage critical data.

b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.

To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?

A.

Risk Assessment

B.

Risk Management

C.

Risk Identification

D.

Risk Mitigation

Page: 1 / 5
Total 45 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025