Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

312-76 Exam Dumps - ECCouncil Certified Ethical Hacker Questions and Answers

Question # 24

Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?

Options:

A.

Point in Time Recovery

B.

Load Balancing

C.

Clustering

D.

High-Availability

Buy Now
Question # 25

Gloria was auditing the BCP prepared by one of her clients. The BCP audit stage that she was currently examining ascertained whether operational resiliency and continuity was being encouraged, and if the BCP was overfunded or underfunded. Which BCP audit stage was Gloria examining?

Options:

A.

Ongoing Program Management

B.

Overall Program Governance

C.

Management of Process Changes

D.

Overall Testing of the Plan

Buy Now
Question # 26

Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?

Options:

A.

Full Backup

B.

Normal Backup

C.

Incremental Backup

D.

Differential Backup

Buy Now
Question # 27

An organization is facing issues with updating its data since it has been the culture of the organization for employees to create individual backups for the same data. This is not only consuming a lot of virtual storage space but is also eating into the bandwidth of the organization. Additionally, this can also lead to a potential data leak in the organization. What can be done to contain this situation?

Options:

A.

Data Erasure

B.

Data Remanence

C.

Failover

D.

Deduplication

Buy Now
Question # 28

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

Options:

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Buy Now
Question # 29

Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?

Options:

A.

Survivable Storage System

B.

Decentralized Computing

C.

Mirroring

D.

Mainframe Computer System

Buy Now
Question # 30

Fred identified that his organization was vulnerable to mainly two risks:

a. One was a sudden power outage that could damage critical data.

b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.

To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?

Options:

A.

Risk Assessment

B.

Risk Management

C.

Risk Identification

D.

Risk Mitigation

Buy Now
Question # 31

Which of the following is NOT an advantage of colocation facilities?

Options:

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Buy Now
Question # 32

Which of the following terms refers to the ease with which technicians can resolve or replace failing components or systems?

Options:

A.

Reparability

B.

Recoverability

C.

Robustness

D.

Redundancy

Buy Now
Question # 33

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Object Granularity (ROG)

C.

Recovery Location Scope (RLS)

D.

Recovery Service Resiliency (RSR)

Buy Now
Exam Code: 312-76
Exam Name: EC-Council Disaster Recovery Professional v3 (EDRP)
Last Update: Apr 29, 2025
Questions: 150
312-76 pdf

312-76 PDF

$34  $84.99
312-76 Engine

312-76 Testing Engine

$38  $94.99
312-76 PDF + Engine

312-76 PDF + Testing Engine

$54  $134.99