BCP DRP Flashcards

1
Q

BCP

A

Business continuity planning deals with keeping business operations running when disaster struck(backup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DRP

A

Disaster recovery planning , restoring normal business operations .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BCP DRP have three common elements

A

> identification of critical business functions
Identification of possible disaster scenarios
Experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Successful BCP project inlcudes

A

> sr management support
sr management involvement
BCP project team must include all business unit team members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Successful BCP project components

A

> Scope determination
political pressures can influence the scope of the BCP as well.
Scope creep : when project scope grows beyond the Original content
The business impact assestment
How disaster can effect a business. quantitive and qualitive analysis is required.
quantitive analysis -> financial
qualititve analysis -> value of good or service delivery
The business continuity planning
Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BIA

A
> Perform a vulnerability assesment 
> Carry out a Criticality assessment 
> Determine the Maximum tolerable downtime
> Establish recovery target
> determine resource requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTD

A

Maximum Tolerable Downtime (MTD) which defines the total amount of time that a business process can be disrupted without causing any unacceptable consequences. This value should be defined by the business management team or someone like CTO, CIO or IT manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RTO

A

Recovery Time Objective (RTO) determines the maximum tolerable amount of time needed to bring all critical systems back online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WRT

A

Work Recovery Time (WRT) determines the maximum tolerable amount of time that is needed to verify the system and/or data integrity. This could be, for example, checking the databases and logs, making sure the applications or services are running and are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Emergency Response

A

emergency response team should be available for all disasters to keep critical business up . this response team needs written procedures and checklists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

full backup

A

A full backup is exactly what the name implies. It is a full copy of your entire data set. Although full backups arguably provide the best protection, most organizations only use them on a periodic basis because they are time consuming, and often require a large number of tapes or disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incremental backup

A

Incremental backups only backup the data that has changed since the previous backup,The primary disadvantage to incremental backups is that they can be time-consuming to restore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffrential backup

A

A differential backup is similar to an incremental backup in that it starts with a full backup, and subsequent backups only contain data that has changed. The difference is that while an incremental backup only includes the data that has changed since the previous backup, a differential backup contains all of the data that has changed since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software escrow

A

Source code escrow is the deposit of the source code of software with a third party escrow agent,
Necessity of escrow
As the continued operation and maintenance of custom software is critical to many companies, they usually desire to make sure that it continues even if the licensor becomes unable to do so, such as because of bankruptcy. This is most easily achieved by obtaining a copy of the up-to-date source code. The licensor, however, will often be unwilling to agree to this, as the source code will generally represent one of their most closely guarded trade secrets.[1]

As a solution to this conflict of interest, source code escrow ensures that the licensee obtains access to the source code only when the maintenance of the software cannot otherwise be assured, as defined in contractually agreed-upon conditions.[2]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly