Which of the following services provides mail and calendar services?
A. Application Server
B. Web Server
C. Exchange Server
D. Domain Controller
Which of the following terms refers to a graphical representation of a series of data protection tools and services that are designed to help balance the overall cost of data protection against the time-to-recovery in the event of data loss?
A. 3DR
B. Continuous Data Protection
C. Data Protection Continuum
D. Data Backup
Emma was conducting scenario training in her organization. In the training phase that was currently being conducted, the participants were well informed in advance about the training taking place. Which training phase was currently being conducted?
A. Warning Phase
B. Review Phase
C. Planning Phase
D. Execution Phase
When information availability increases in PASIS architecture, which feature decreases as a result?
A. Nonrepudiation
B. Durability
C. Confidentiality
D. Latency
An online betting site accepts bets for sporting events held around the world. Due to this, their operations need to be up 24x7. During an internal IT audit, they discovered a vulnerability in their payment gateway system. They assessed that should the payment gateway go down for more than an hour, they will lose about $100,000 and about 15% of their customers to their competitor website. Moreover, they might lose 25% of their customer base permanently due to the constant promotions run by their competitor to attract and retain new customers. This was unacceptable for the business under any circumstances, so immediate corrective measures were taken to fix the vulnerability. What technical term best defines this time period of two hours?
A. Recovery Point Objective (RPO)
B. Maximum Tolerable Period of Disruption (MTPOD)
C. Recovery Time Objective (RTO)
D. Work Recovery Time (WRT)
Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?
A. Transparency
B. Openness
C. Scalability
D. Monotonicity
Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?
A. System Migration
B. System Backup
C. System Replication
D. System Recovery
Which of the following terms refers to the training milestones that must be achieved in order to meet the BC training program’s aim?
A. Time-Related Objectives
B. Development Objectives
C. Routine Objectives
D. Terminal Objectives
Jess, who owns an IT firm, wants to implement the standard for societal security in the business continuity management system in her organization to reap its benefits in the future if a disaster strikes. Which of the following standards should she implement?
A. ISO 27031
B. ISO 22301
C. NFPA 1600
D. ISO 27005
Using which feature of Windows 10 can users preserve the state of the systems including the important system files, installed applications, and system settings?
A. System Backup
B. System Restore
C. System Update
D. Failover Replication
Which of the following terms refers to a dedicated server that is also used for file storage and sharing?
A. Data Virtualization
B. Cloud Storage
C. Storage Area Network (SAN)
D. Network Attached Storage (NAS)
Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?
A. Mirroring
B. Deduplication
C. Failover
D. Server Clustering
| Page 3 out of 13 Pages |
| 1234 |
| 312-76 Practice Test Home |
Real-World Scenario Mastery: Our 312-76 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Disaster Recovery Professional exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 312-76 practice exam questions pool covering all topics, the real exam feels like just another practice session.