900 Flashcards
gives an organization the ability to continue providing service while experiencing a technical failure. A common mechanism is service or infrastructure duplication.
Fault tolerance
List at least three potential reporting points in an organization. These are people to whom a security incident should be reported.
CISO - ISO - CSO - CEO - CIO - COO
What is a plan that defines the procedures for responding to a security incident: A. IRP B. DCP C. BIA D. None of the above
A. IRP
A BCP is used to define the process and procedures used to clean up a disaster.
A. True
B. False
B. False
An incident response team should be trained to methodically collect __________ without destroying or altering if in any way.
Evidence
What type of evidence gives the most solid proof of a crime? A. Corroborative B. Circumstantial C. Best D. Opinion
C. Best
__________ __________ is used when best evidence cannot be acquired.
Secondary evidence
Another location from which to conduct business in the event of a disaster is called a(n) __________.
Alternate site (cold - warm - hot)
A technology in which a standby server exists only to take over for another server in the event of its failure.
Asymmetric Server Cluster
Rolling back a disaster recovery implementation to the starting point so that different approach can be taken.
Backout/Contingency Option
The ability of an organization to maintain its operations and services in the face of a disruptive event.
Business Continuity
The process of identifying exposure to threats - creating preventive and recovery procedures - and then testing them to determine if they are sufficient.
Business Continuity Planning and Testing
An analysis of the most important mission-critical business functions - which identifies and quantifies the impact of such loss of the functions may have on the organization in terms of its operational and financial positions.
Business Impact Analysis (BIA)
A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.
Chain of Custody
A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations.
Cold Site
Using technology to search for computer evidence of a crime.
Computer Forensics
The process of copying information to a different medium and storing it (preferably at an off-site location) so that it can be used in the event of a disaster.
Data Backups
The procedures and processes for restoring an organization’s IT operations following a disaster.
Disaster Recovery
A written document that details the process for restoring IT resources following an event that causes a significant disruption in the service.
Disaster Recovery Plan (DRP)
A metallic enclosure that prevents the entry or escape of an electromagnetic field.
Faraday Cage
The application of science to questions that are of interest to the legal profession.
Forensics (Forensic Science)
Systems that provide and regulate heating and cooling.
Heating - Ventilation - and Air Conditioning (HVAC)
A system that can function for an extended period of time with little downtime.
High Availability
A layout in a data center that can be used to reduce heat by managing the air flow.
Hot Aisle/Cold Aisle
A duplicate of the production site that has all the equipment needed for an organization to continue running - including office space and furniture - telephone jacks - computer equipment - and a live telecommunications link.
Hot Site
A statistical value that is the average time until a component fails - cannot be repaired - and must be replaced.
Mean Time Between Failures (MTBF)
The average time needed to reestablish services to their former state.
Mean Time to Restore (MTTR)
The sequence of volatile data that must be preserved in a computer forensic investigation.
Order of Volatility
A technology that uses multiple hard disk drives for increased reliability and performance.
RAID (Redundant Array of Independent Drives)
The maximum length of time that an organization can tolerate between backups.
Recovery Point Objective (RPO)
The length of time it will take to recover the data that has been backed up.
Recover Time Objective (RTO)
A combination (clustering) of two or more servers that are interconnected to appear as one.
Server Cluster
A component or entity in a system which - if it no longer functions - would adversely affect the entire system.
Single Point of Failure
Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.
Succession Planning
A technology in which every server in the cluster performs useful work and if one server fails - the remaining servers continue to perform their normal work as well as that of the failed server.
Symmetric Server Cluster
A snapshot of the current state of the computer that contains all settings and data.
System Image
A remote site that contains computer equipment but does not have active Internet or telecommunication facilities - and does not have backups of data.
Warm Site
Each of the following is a category of fire suppression systems except a \_\_\_\_\_\_\_\_\_\_\_\_. A. clean agent system B. dry chemical system C. wet chemical system D. water sprinkler system
C. wet chemical system