900 Flashcards

1
Q

gives an organization the ability to continue providing service while experiencing a technical failure. A common mechanism is service or infrastructure duplication.

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List at least three potential reporting points in an organization. These are people to whom a security incident should be reported.

A

CISO - ISO - CSO - CEO - CIO - COO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What is a plan that defines the procedures for responding to a security incident:
A. IRP
B. DCP
C. BIA
D. None of the above
A

A. IRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A BCP is used to define the process and procedures used to clean up a disaster.
A. True
B. False

A

B. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An incident response team should be trained to methodically collect __________ without destroying or altering if in any way.

A

Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What type of evidence gives the most solid proof of a crime?  
A. Corroborative
B. Circumstantial
C. Best
D. Opinion
A

C. Best

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ __________ is used when best evidence cannot be acquired.

A

Secondary evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Another location from which to conduct business in the event of a disaster is called a(n) __________.

A

Alternate site (cold - warm - hot)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technology in which a standby server exists only to take over for another server in the event of its failure.

A

Asymmetric Server Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rolling back a disaster recovery implementation to the starting point so that different approach can be taken.

A

Backout/Contingency Option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ability of an organization to maintain its operations and services in the face of a disruptive event.

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of identifying exposure to threats - creating preventive and recovery procedures - and then testing them to determine if they are sufficient.

A

Business Continuity Planning and Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An analysis of the most important mission-critical business functions - which identifies and quantifies the impact of such loss of the functions may have on the organization in terms of its operational and financial positions.

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations.

A

Cold Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using technology to search for computer evidence of a crime.

A

Computer Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of copying information to a different medium and storing it (preferably at an off-site location) so that it can be used in the event of a disaster.

A

Data Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The procedures and processes for restoring an organization’s IT operations following a disaster.

A

Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A written document that details the process for restoring IT resources following an event that causes a significant disruption in the service.

A

Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A metallic enclosure that prevents the entry or escape of an electromagnetic field.

A

Faraday Cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The application of science to questions that are of interest to the legal profession.

A

Forensics (Forensic Science)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Systems that provide and regulate heating and cooling.

A

Heating - Ventilation - and Air Conditioning (HVAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A system that can function for an extended period of time with little downtime.

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A layout in a data center that can be used to reduce heat by managing the air flow.

A

Hot Aisle/Cold Aisle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A duplicate of the production site that has all the equipment needed for an organization to continue running - including office space and furniture - telephone jacks - computer equipment - and a live telecommunications link.

A

Hot Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A statistical value that is the average time until a component fails - cannot be repaired - and must be replaced.

A

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The average time needed to reestablish services to their former state.

A

Mean Time to Restore (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The sequence of volatile data that must be preserved in a computer forensic investigation.

A

Order of Volatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A technology that uses multiple hard disk drives for increased reliability and performance.

A

RAID (Redundant Array of Independent Drives)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The maximum length of time that an organization can tolerate between backups.

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The length of time it will take to recover the data that has been backed up.

A

Recover Time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A combination (clustering) of two or more servers that are interconnected to appear as one.

A

Server Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A component or entity in a system which - if it no longer functions - would adversely affect the entire system.

A

Single Point of Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.

A

Succession Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A technology in which every server in the cluster performs useful work and if one server fails - the remaining servers continue to perform their normal work as well as that of the failed server.

A

Symmetric Server Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A snapshot of the current state of the computer that contains all settings and data.

A

System Image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A remote site that contains computer equipment but does not have active Internet or telecommunication facilities - and does not have backups of data.

A

Warm Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Each of the following is a category of fire suppression systems except a \_\_\_\_\_\_\_\_\_\_\_\_.  
A. clean agent system
B. dry chemical system
C. wet chemical system
D. water sprinkler system
A

C. wet chemical system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Each of the following is required for a fire to occur except __________.
A. a spark to start the process
B. a type of fuel or combustible material
C. sufficient oxygen to sustain the combustion
D. a chemical reaction that is the fire itself

A

A. a spark to start the process

40
Q
An electrical fire like that which would be found in a computer data center is known as what type of fire?
A. Class A
B. Class B
C. Class C
D. Class D
A

C. Class C

41
Q
Van Eck phreaking is \_\_\_\_\_\_\_\_\_\_.
A. blocked by using shielded cabling
B. picking up electromagnetic fields generated by a computer system.
C. reverse confidentiality
D. is always used with wireless networks
A

B. picking up electromagnetic fields generated by a computer system

42
Q

Plenums are __________.
A. no longer used today
B. the air-handling space above drop ceilings
C. required in all buildings with over six stories
D. never to be used for locating equipment

A

B. the air-handling space above drop ceilings

43
Q
RAID \_\_\_\_\_\_\_\_\_\_ uses disk mirroring and is considered fault-tolerant.
A. Level 1
B. Level 2
C. Level 3
D. Level 4
A

A. Level 1

44
Q
A standby server that exists only to take over for another server in the event of its failure is known as a(n) \_\_\_\_\_\_\_\_\_\_.
A. asymmetric server cluster
B. rollover server
C. failsafe server
D. symmetric server cluster
A

A. asymmetric server cluster

45
Q

RAID is an abbreviation of __________.
A. Redundant Array of IDE Drives
B. Resilient Architecture for Interdependent Discs
C. Redundant Array of Independent Drives
D. Resistant Architecture of Interrelated Data Storage

A

C. Redundant Array of Independent Drives

46
Q
Which of the following is an example of a nested RAID?
A. Level 1-0
B. Level 0-1
C. Level 0+1
D. Level 0/1
A

C. Level 0+1

47
Q
A(n) \_\_\_\_\_\_\_\_\_\_ is always running off its battery while the main power runs the battery charger.
A. offline UPS
B. backup UPS
C. online UPS
D. secure UPS
A

C. online UPS

48
Q
A \_\_\_\_\_\_\_\_\_\_ is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running. 
A. cold site
B. warm site
C. hot site
D. replicated site
A

C. hot site

49
Q

A UPS can perform each of the following except __________.
A. prevent certain applications from launching that will consume too much power
B. disconnect users and shut down the server
C. prevent any new users form logging on
D. notify all users that they must finish their work immediately and log off.

A

A. prevent certain applications from launching that will consume too much power

50
Q

Which of the following is not a characteristic of a disaster recover plan (DRP)?
A. it is updated regularly
B. it is a private document only used by top-level administrators for planning
C. it is written
D. it is detailed

A

B. it is a private document only used by top-level administrators for planning

51
Q
Any time the contents of a file are changed -  the archive bit is changed to \_\_\_\_\_ -  meaning that this modified file now needs to be backed up. 
A. 0
B. 1
C. 2
D. 3
A

B. 1

52
Q

An incremental backup ___________.
A. copies selected files
B. copies all files
C. copies all files since the last full backup
D. copies all files changed since the last full or incremental backup

A

D. copies all files changed since the last full or incremental backup

53
Q

Each of the following is a basic question to be asked regarding creating a data backup except: __________.
A. how long will it take to finish the backup?
B. where should the backup be stored?
C. what information should be backed up?
D. what media should be used?

A

A. how long will it take to finish the backup?

54
Q
The chain of \_\_\_\_\_\_\_\_\_\_ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence. 
A. forensics
B. evidence
C. control
D. custody
A

D. custody

55
Q
\_\_\_\_\_\_\_\_\_\_ is the maximum length of time that an organization can tolerate between data backups. 
A. recovery service point (RSP)
B. recovery point objective (RPO)
C. optimal recovery time frame (ORT)
D. recover time objective (RTO)
A

B. recovery point objective (RPO)

56
Q
A data backup solution that uses a magnetic disk as a temporary storage area is \_\_\_\_\_\_\_\_\_\_\_. 
A. disk to disk to tape (D2D2T)
B. disk to disk (D2D)
C. tape to disk (T2D)
D. continuous data protection (CDP)
A

A. disk to disk to tape (D2D2T)

57
Q
When an unauthorized event occurs -  the first duty of the computer forensics response should be to \_\_\_\_\_\_\_\_\_\_\_. 
A. log-off the server
B. secure the crime scene
C. back up the hard drive
D. reboot the system
A

B. secure the crime scene

58
Q

BIA stands for __________.

A

Business Impact Analysis

59
Q

MTTR stands for __________.

A

Mean Time to Restore

60
Q

DRP stands for __________.

A

Disaster Recovery Plan

61
Q

MTBF stands for __________.

A

Mean Time Between Failures

62
Q

RAID level that uses a striped disk array so that data is broken down into blocks and each block is written to a separate disk drive.

A

RAID Level 0

63
Q

RAID level that uses a mirrored array whose segments are RAID 0 arrays.

A

RAID Level 0+1

64
Q

RAID level that writes data twice to separate drives.

A

RAID Level 1

65
Q

RAID level where each entire data block is written on a data disk and parity for blocks in the same rank is generated and recorded on a separate disk.

A

RAID Level 5

66
Q

Minimum number of drives needed for RAID Level 0.

A

2

67
Q

Minimum number of drives needed for RAID Level 0+1.

A

4

68
Q

Minimum number of drives needed for RAID Level 1.

A

2

69
Q

Minimum number of drives needed for RAID Level 5.

A

3

70
Q

Imaging applications are typically used for this RAID level.

A

RAID Level 0+1

71
Q

Financial applications are typically used for this RAID level.

A

RAID Level 1

72
Q

Databases are the typical application for this RAID level.

A

RAID Level 5

73
Q

Video production and editing applications are typically used for this RAID level.

A

RAID Level 0

74
Q

A simple design and easy to implement RAID - but not fault tolerant.

A

RAID Level 0

75
Q

A simple RAID to implement - but can slow down a system if RAID controlling software is used instead of hardware.

A

RAID Level 1

76
Q

The most versatile RAID - but it can be difficult to rebuild in the event a disk fails.

A

RAID Level 5

77
Q

This RAID has high input/output rates and is expensive.

A

RAID Level 0+1

78
Q

When creating a data backup - five basic questions should be asked. List the questions.

A
  1. What information should be backed up?
  2. How often should it be backed up?
  3. What media should be used?
  4. Where should the backup be stored?
  5. What hardware or software should be used?
79
Q

Explain how a full backup is used - what the archive bit is set to after the backup - and what files are needed for recovery.

A

A full backup is the starting point for all backups. After the backup the archive bit is cleared (set to 0). The full backup is needed to recover files.

80
Q

Explain how a differential backup is used - what the archive bit is set to after the backup - and what files are needed for recovery.

A

A differential backup backs up any data that has changed since the last full backup. After the backup the archive bit is not cleared (set to 1). The full backup and only the last differential backup are needed to recover files.

81
Q

Explain how a incremental backup is used - what the archive bit is set to after the backup - and what files are needed for recovery.

A

An incremental backup backs up any data that has changed since the last full backup or last incremental backup. After the backup the archive bit is cleared (set to 0). The full backup and all incremental backups are needed to recover files.

82
Q

RPO stands for __________.

A

Recovery Point Objective

83
Q

RTO stands for __________.

A

Recovery Time Objective

84
Q

List the 3 types of CDP and the type of data that is protected.

A
  1. Block-level CDP- the entire volume is protected.
  2. File-level CDP- the individual files are protected.
  3. Application-level CDP- individual application changes are protected.\
85
Q

List the 4 basic forensic procedures:

A
  1. Secure the crime scene
  2. Preserve the evidence
  3. Establish the chain of custody
  4. Examine the evidence
86
Q

What are the 6 steps in damage control?

A
  1. Report the incident to security or the police
  2. Confront any suspects (if the situation allows)
  3. Neutralize the suspected perpetrator form harming others (if necessary)
  4. Secure physical security features
  5. Quarantine electronic equipment
  6. Contact the response team
87
Q

List the orders of volatility and the location of the data.

A

First- register - cache - peripheral memory
Second- random access memory (RAM)
Third- network state
Fourth- running processes

88
Q

A mirror image is also referred to as __________.

A

Bitstream Backup

89
Q

List and describe the 2 types of slack.

A
  1. RAM Slack- pertains to the last sector of a file

2. Drive File Slack- can contain remnants of previously deleted files or data

90
Q

What is an SLA?

A

Service Level Agreement is a service contract between a vendor and client that specifies what services will be provided - responsibilities of each party - and any guarantees of service. Most SLA’s are based on percentages of uptime that are guaranteed.

91
Q

How is MTBF calculated?

A

MTBF= total time measured divided by total number of failures observed

92
Q

Name the 3 types of fire suppression systems.

A

1- water sprinkler
2- dry chemical
3- clean agent

93
Q

What is ESD?

A

Electrostatic discharge is the sudden flow of electrical current between two objects.

94
Q

Explain the server hot aisle/cold aisle layout.

A

1- rows of rack fronts are the cold aisles and face air conditioning output ducts
2- rows that are the back of the racks where the heated exhaust exits are the hot aisles and generally face the air conditioning return ducts.

95
Q

A policy that defines the actions users may perform while accessing systems and networking equipment.

A

Acceptable Use Policy (AUP)

96
Q

A methodology for making modifications to a system and keeping track of those changes.

A

Change Management

97
Q

The “framework” and functions required to enable incident response and incident handling with an organization.

A

Incident Management