6.7 Explain business continuity concepts. Flashcards

1
Q

What needs to be considered when deciding priorities for restoring systems as part of disaster recovery?

A

Dependencies between different systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a challenge encountered when backing up databases that are always in use?

A

It requires replication and online backups.
Unlike file systems, databases are often always in use, preventing copy-based mechanisms from opening the files to create a copy. Therefore, alternative methods are needed. Transactional updates allow for replicating the database to a replica, or copy, on a different server or location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a recommended technique for restoring access to users after disaster recovery?

A

Restricting user numbers initially so that the system can be monitored and verified as working normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What network redundancy technique can be used at the server level (i.e., on a domain controller) to prevent the loss of important domain functionality?

A

Installing multiple network cards or adapters and configuring load balancing with failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is NOT an example of a contingency plan?

A

Switches are installed in closets within each building where employees work.
Contingency plans are used for many purposes. In terms of business continuity, a contingency plan is used to ensure a business process can continue despite problems with information technology. Of the choices listed, installing switches in closets is a standard IT architecture decision and is not related to a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between business continuity and disaster recovery?

A

Disaster recovery creates workflows and resources to use when a specific scenario affects an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a key aspect of a fault tolerant system?

A

Avoidance of single points of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Redundant Array of Independent Risks (RAID) involves striping data across multiple disks and uses parity data?

A

RAID 5
Combining hard drives into an array of disks, called a Redundant Array of Independent Disks (RAID), can help to avoid service unavailability due to one or more disks failing. In RAID 5, information is striped across multiple disks and parity data is used to calculate what data was destroyed during a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a significant advantage of cloud-based backups?

A

The backups are geographically dispersed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a method of verifying a backup of critical files?

A

Having one of the files restored
A method of verifying a backup of critical files is to have one of the files restored. The ability to restore one of the files in a list is a good indication of the possibility of restoring all of the files. Testing as many as possible will provide greater reassurance that the backups are intact and usable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What fault tolerance technique can allow quick recovery during power outages and network failures?

A

Creating dispersed redundant data centers and replicating information in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly