Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-76 Practice Exam with Questions & Answers

Questions 1

To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?

Options:
A.

ISO 27001

B.

INCITS 483-2012

C.

ISO 27031

D.

ISO/IEC 27005

ECCouncil 312-76 Premium Access
Questions 2

Joanna installed a software on her office computer that backed up, restored, and recovered database files. The software performed these functions using database server sessions. Which software did Joanna install?

Options:
A.

Virtuozzo

B.

Disk Drill

C.

Recuva

D.

RMAN

Questions 3

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

Options:
A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)

Questions 4

Which of the following terms refers to a collection of historical records specifically selected for long-term retention and future reference?

Options:
A.

Data Archiving

B.

Data Backup

C.

Data Restore

D.

Data Deletion

Questions 5

Due to the occurrence of a disaster, the data and applications at Phil’s organization were lost. Fortunately, Phil had invested in a disaster recovery tier. This disaster recovery tier provided Phil with automated recovery of data and applications. Which disaster recovery tier did Phil invest in?

Options:
A.

Tier 4

B.

Tier 7

C.

Tier 6

D.

Tier 2

Questions 6

Katie was setting up disaster recovery teams in her organization to combat any disaster that occurred. One of the most important teams was the disaster recovery coordinator. Having two names in mind for the post, Katie interviewed the two people for the roles and responsibilities of the disaster recovery coordinator. Which of the following statements should either of the interviewees use to get the post?

Options:
A.

Responsible for disaster recovery planning verification and compliance

B.

Day-to-day management control over the execution and maintenance of the disaster recovery program

C.

Responsible for the specification and design of all technology-based disaster recovery solutions

D.

Executive authority over the disaster recovery program

Questions 7

After Colin’s organization had identified and prioritized the risks faced by the organization, Colin decided to implement certain strategies to manage risk (also known as risk response). Which of the following strategies is not a part of risk response?

Options:
A.

Acceptance

B.

Mitigation

C.

Safety

D.

Sharing

Questions 8

Which of the following services provides mail and calendar services?

Options:
A.

Application Server

B.

Web Server

C.

Exchange Server

D.

Domain Controller

Questions 9

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

Options:
A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Questions 10

Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?

Options:
A.

Return on Risk Adjusted Capital (RORAC)

B.

Value at Risk

C.

Risk Adjusted Return On Capital (RAROC)

D.

Risk Valuation

Exam Code: 312-76
Certification Provider: ECCouncil
Exam Name: Disaster Recovery Professional Practice Test
Last Update: Jun 24, 2025
Questions: 150