Fred identified that his organization was vulnerable to mainly two risks:
a. One was a sudden power outage that could damage critical data.
b. Second was the malicious attachment in an email. Since Fred’s organization received many emails enquiring about the services from unknown sources.
To face these risks, Fred decided to take some cautionary measures. Despite his office being in a locality where power was seldom disrupted, there had been instances in the past when the authorities shut down power without warning owing to an oncoming storm. Hence, Fred had a backup generator installed. Then, Fred asked his IT team to install a malware and spam protection software at the mail server to scan all the emails coming to the organization. Additionally, he also had an eight-hour backup system installed in his organization’s server room. This would give him enough time to properly power down the servers. These two steps by him greatly mitigated the two primary risks faced by his organization. Which process did Fred go through?
A. Risk Assessment
B. Risk Management
C. Risk Identification
D. Risk Mitigation
After Colin’s organization had identified and prioritized the risks faced by the organization, Colin decided to implement certain strategies to manage risk (also known as risk response). Which of the following strategies is not a part of risk response?
A. Acceptance
B. Mitigation
C. Safety
D. Sharing
Which of the following terms refers to a client-server architecture that is merged with layered architecture?
A. N-Tier Architecture
B. Application Server-Tier Architecture
C. Client-Server Architecture
D. Tightly Coupled Architecture
XYZ Inc. has set up an FTP server between its primary site of business and its backup site. Jennifer, the IT administrator, is charged with transferring all the critical data to the backup site via this FTP server. Which of the following terms best describes the process?
A. Electronic Vaulting
B. Disk Duplexing
C. Disk Shadowing
D. Manually copying the data files and transferring them to the remote site
Matt needed multiple servers for his organization but could purchase only one. Using a particular technology, he created several logical servers on his sole physical server. Which technology did Matt make use of?
A. Mirroring
B. Virtualization
C. Deduplication
D. Snapshot
The internal audit of the BCP takes place so as to make sure the plan conforms to which particular standard?
A. ISO 22301:2012
B. ISO/IEC 27005:2011
C. ISO/IEC 27031:2011
D. ISO 22313
Jack updated the operating system of his MacBook to the latest beta version. A few hours later, while working on his MacBook, Jack discovers that some of his installed applications are not working properly, and this may be due to the bug-ridden beta update. Hence, he decides to restore his MacBook to the previous OS version. Which MacBook feature should Jack be using in this scenario?
A. Time Shift
B. Image Recovery
C. Snapshots
D. Time Machine
While implementing a business continuity plan in her organization, Jane wants to make use of a specific standard. This specific standard would guide her organization in establishing, implementing, and maintaining a formal and documented business impact analysis (BIA) process. Which of the following standards did Jane want to implement in her organization?
A. ISO/IEC 27005
B. AS/NZS 5050
C. ISO/TS 22317
D. ISO/IEC 27031
Which of the following refers to a central command and control facility responsible for carrying out recovery actions, coordinating response and resources, and assuring the coherence of operations of an organization?
A. Crisis Command Center
B. Colocation Facilities
C. Mobile Recovery Center
D. Emergency Operations Center
Which of the following clusters provides consistent file system images across servers in a cluster, allowing the servers to simultaneously read and write to a single shared file system?
A. High-Performance Clusters
B. High-Availability Clusters
C. Failover Cluster
D. Storage Cluster
Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?
A. Availability
B. Integrity
C. Nonrepudiation
D. Precaution
Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?
A. Restoration
B. Resumption
C. Response
D. Business Continuity
| Page 2 out of 13 Pages |
| 1234 |
| 312-76 Practice Test Home |
Real-World Scenario Mastery: Our 312-76 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Disaster Recovery Professional exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 312-76 practice exam questions pool covering all topics, the real exam feels like just another practice session.