ch 14 Flashcards

1
Q

An organization’s ability to maintain operations after a disruptive event

A

• Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

• (B C P)

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifying exposure to threats
Creating preventative and recovery procedures
Testing them to determine if they are sufficient

A

• (B C P) Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• (B I A)

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identifies business functions and quantifies the impact a loss of these functions may have on business operations

A

• (B I A) Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A (B I A) will help determine

A

the mission-essential function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Activity that serves as the core purpose of the enterprise

A

mission-essential function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

That support the mission-essential function

A

The identification of critical system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is a component or entity in a system which will disable the entire system, should it no longer function

A

Single-point-of-failure (SPOF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(SPOF)

A

Single-point-of-failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Used to identify and mitigate privacy risks
A

Privacy impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can determine if a system contains personally identifiable information (P I I)

A

Privacy threshold assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• (D R P)

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focuses on protecting and restoring information technology functions

A

• (D R P) Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intended to be a detailed document that is updated regularly

A

Comprehensive in scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the typical outline of a DRP

A
Unit 1: Purpose and Scope
Unit 2: Recovery Team
Unit 3: Preparing for a Disaster
Unit 4: Emergency Procedures
Unit 5: Restoration Procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sequence in restoring systems

A

(order of restoration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the process of resynchronizing data back to the primary location

A

Failback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disaster exercise objectives

A

Test efficiency of interdepartmental planning and coordination in managing a disaster
Test current D R P procedures
Determine response strengths and weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Simulate an emergency situation but in an informal and stress-free environment

A

Tabletop exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To analyze the exercise results to identify strengths to be maintained and weaknesses to improve upon

A

An after-action report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Refers to a system’s ability to deal with malfunctions

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which is the use of duplicated equipment to improve the availability of a system
A goal is to reduce a variable known as the mean time to recovery (M T T R)

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(M T T R)

A

Mean time to recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The average amount of time that it will take a device to recover from a failure that is not a terminal failure
Mean time to recovery (M T T R)
26
Play a key role in network infrastructure | Failure can have significant business impact
• Servers
27
Combining two or more devices to appear as a single unit
Clustering
28
Multiple servers that appear as a single server | Connected through public and private cluster connections
Server cluster
29
one server is doing all the work, the other server is on stand-by)
Asymmetric
30
(both servers are working the same amount of work)
Symmetric
31
(M T B F)
Mean time between failures
32
Measures average time until a component fails and must be replaced Can be used to determine number of spare hard drives an organization should keep
Mean time between failures (M T B F)
33
(R A I D)
Redundant Array of Independent Devices
34
Uses multiple hard disk drives to increase reliability and performance Can be implemented through software or hardware
Redundant Array of Independent Devices (R A I D)
35
Striping partitions hard drive into smaller sections Data written to the stripes is alternated across the drives If one drive fails, all data on that drive is lost
R A I D Level 0 (striped disk array without fault tolerance)
36
Disk mirroring used to connect multiple drives to the same disk controller card Action on primary drive is duplicated on other drive Primary drive can fail and data will not be lost
RAID Level 1 (mirroring)
37
Variation of RAID Level 1 Separate cards used for each disk Protects against controller card failures
Disk duplexing
38
``` Distributes parity (error checking) across all drives Data stored on one drive and its parity information stored on another drive ```
RAID Level 5 (independent disks with distributed parity)
39
Nested-level R A I D Mirrored array whose segments are RAID 0 arrays Can achieve high data transfer rates
RAID 0+1 (high data transfer)
40
May be necessary due to critical nature of connectivity today Wait in the background during normal operations Use a replication scheme to keep live network information current Launch automatically in the event of a disaster Hardware components are duplicated
Redundant networks
41
(S D N s)
Software defined networks
42
what controller can increase network reliability and may lessen the need for redundant equipment
Software defined networks (S D N s)
43
(U P S)
Uninterruptible power supply
44
Maintains power to equipment in the event of an interruption in primary electrical power source
Uninterruptible power supply (U P S)
45
Least expensive, simplest solution Charged by main power supply Begins supplying power quickly when primary power is interrupted Switches back to standby mode when primary power is restored
Off-line U P S
46
Always running off its battery while main power runs battery charger Not affected by dips or sags in voltage Can serve as a surge protector
On-line U P S
47
Powered by diesel, natural gas, or propane
Backup generator
48
Backup sites may be necessary if flood, hurricane, or other major disaster damages buildings
• Recovery Sites
49
Generally run by a commercial disaster recovery service Duplicate of the production site Has all needed equipment Data backups can be moved quickly to the hot site
Hot site
50
``` Provides office space Customer must provide and install all equipment needed to continue operations No backups immediately available Less expensive than a hot site Takes longer to resume full operation ```
Cold site
51
All equipment is installed No active Internet or telecommunications facilities No current data backups Less expensive than a hot site Time to turn on connections and install backups can be half a day or more
Warm site
52
copying information to a different medium and storing it at an off-site location So that it can be used in the event of a disaster
Data backup
53
(R P O)
Recovery point objective
54
(R T O)
Recovery time objective
55
startup point for all backups
full backup
56
back ups any data that has changed since last full backup
differential backup
57
backs up any data that has changed since last full backup or last incremental backup
incremental backup
58
(C D P)
continuous data protection
59
Performs continuous backups that can be restored immediately Maintains a historical record of all changes made to data Creates a snapshot of the data (like a reference marker)
continuous data protection (C D P)
60
Methods to prevent disruption through environmental controls
Fire suppression Electromagnetic disruption protection Proper configuration of H V A C systems FM200 system
61
the attempts to reduce the impact of a fire
• Fire Suppression
62
(E M I)
Electromagnetic interference
63
(E M P)
electromagnetic pulse
64
Caused by a short-duration burst of energy by the source called
electromagnetic pulse (E M P)
65
(E M C)
Electromagnetic compatibility
66
Reducing or eliminating the unintentional generation, spread, and reception of electromagnetic energy
Electromagnetic compatibility (E M C)
67
Metal enclosure that prevents entry or escape of electromagnetic fields Often used for testing in electronic labs
Faraday cage
68
(H V A C)
Heating, ventilating, and air conditioning
69
Maintain temperature and relative humidity at required levels
Heating, ventilating, and air conditioning (H V A C) systems
70
Used to reduce heat by managing air flow Servers lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing other direction
Hot aisle/cold aisle layout
71
Involves using forensics and following proper incident response procedures
Incident response
72
Applying science to legal questions | Analyzing evidence and can be applied to technology
• Forensic Science
73
Uses technology to search for computer evidence of a crime
Computer forensics
74
(I R P)
Incident response plan
75
A set of written instructions for reacting to a security incident
Incident response plan (I R P)
76
Incident response process
``` Preparation Identification Containment Eradication Recovery Lessons learned ```
77
what is the first order of volatility
register, cache, peripheral memory
78
what is the second order of volatility
random access memory (RAM)
79
what is the third order of volatility
network state
80
what is the fourth order of volatility
running processes
81
to guarantee accuracy of a backup what would you do to backup programs rely upon hashing algorithms as part of the validation process
Mirror image backup
82
Documents that the evidence was maintained under strict control at all times No unauthorized person was given opportunity to corrupt the evidence
Chain of custody
83
The collection, processing, analysis, and dissemination of intelligence for forming policy changes
Strategic intelligence
84
Involves gaining information about the attacker’s intelligence collection capabilities
Strategic counterintelligence
85
Maintaining active logs regarding the reconnaissance activities conducted by the attacker
Active logging