Ch. 12 Disaster Recovery & Incident Response Flashcards
Cold Site
A physical site that can be used if the main site is inaccessible but lacks the resources to enable an organization to use it immediately.
Differential Backup
Backs up new files or files that have changed since the last full backup. They don’t clear the archive bit upon their completion.
Failover
The process of reconstructing a system or switching over to other systems when a failure is detected.
False positive
A flagged event that isn’t really a notable incident and has been falsely triggered
Hot site
A location that can provide operations within hours of a failure. AKA Active Backup Model
Incremental Backup
Includes only new files or files that have changed since the last full backup and then clears the archive bit upon completion
Intrusion
The act of entering a system without authorization to do so
IDS
Intrusion Detection System - Any set of tools that can identify an attack using defined rules or logic. Can be network based or host based
IPS
Intrusion Prevention System - Any set of tools that identify and then actively respond to attacks based on defined rules. Like an IDS (which is passive) an IPS can be network-based or host-based.
Intrusive tests
Penetration-type testing that involves trying to break the network
Nonintrusive tests
Penetration/vulnerability testing that takes a passive approach rather than actually trying to break into the network
Snapshot
Image of a virtual machine at a moment in time
System image
A snapshot of what exists
Tabletop Exercise
Involves individuals sitting around a table with a facilitator discussion situations that could arise and how best to respond to them.
Vulnerability Scanning
Identifying specific vulnerabilities in your network
Warm Site
A site that provides some capabilities in the event of a disaster. The organization will still need to install, configure, and reestablish operations on systems that might already exist int he warm site. AKA reciprocal site or active/active model
Working Copy Backup
Copy of data currently in use on a network. Also known as shadow copies.
Passive Reconnaissance
Collecting data from public databases, talking to employees/partners, dumpster diving, social engineering