ch 14 Flashcards

1
Q

An organization’s ability to maintain operations after a disruptive event

A

• Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

• (B C P)

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifying exposure to threats
Creating preventative and recovery procedures
Testing them to determine if they are sufficient

A

• (B C P) Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• (B I A)

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identifies business functions and quantifies the impact a loss of these functions may have on business operations

A

• (B I A) Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A (B I A) will help determine

A

the mission-essential function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Activity that serves as the core purpose of the enterprise

A

mission-essential function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

That support the mission-essential function

A

The identification of critical system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is a component or entity in a system which will disable the entire system, should it no longer function

A

Single-point-of-failure (SPOF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(SPOF)

A

Single-point-of-failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Used to identify and mitigate privacy risks
A

Privacy impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can determine if a system contains personally identifiable information (P I I)

A

Privacy threshold assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• (D R P)

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Focuses on protecting and restoring information technology functions

A

• (D R P) Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intended to be a detailed document that is updated regularly

A

Comprehensive in scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the typical outline of a DRP

A
Unit 1: Purpose and Scope
Unit 2: Recovery Team
Unit 3: Preparing for a Disaster
Unit 4: Emergency Procedures
Unit 5: Restoration Procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sequence in restoring systems

A

(order of restoration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the process of resynchronizing data back to the primary location

A

Failback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disaster exercise objectives

A

Test efficiency of interdepartmental planning and coordination in managing a disaster
Test current D R P procedures
Determine response strengths and weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Simulate an emergency situation but in an informal and stress-free environment

A

Tabletop exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To analyze the exercise results to identify strengths to be maintained and weaknesses to improve upon

A

An after-action report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Refers to a system’s ability to deal with malfunctions

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which is the use of duplicated equipment to improve the availability of a system
A goal is to reduce a variable known as the mean time to recovery (M T T R)

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(M T T R)

A

Mean time to recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The average amount of time that it will take a device to recover from a failure that is not a terminal failure

A

Mean time to recovery (M T T R)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Play a key role in network infrastructure

Failure can have significant business impact

A

• Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Combining two or more devices to appear as a single unit

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Multiple servers that appear as a single server

Connected through public and private cluster connections

A

Server cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

one server is doing all the work, the other server is on stand-by)

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

(both servers are working the same amount of work)

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

(M T B F)

A

Mean time between failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Measures average time until a component fails and must be replaced
Can be used to determine number of spare hard drives an organization should keep

A

Mean time between failures (M T B F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

(R A I D)

A

Redundant Array of Independent Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Uses multiple hard disk drives to increase reliability and performance
Can be implemented through software or hardware

A

Redundant Array of Independent Devices (R A I D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Striping partitions hard drive into smaller sections
Data written to the stripes is alternated across the drives
If one drive fails, all data on that drive is lost

A

R A I D Level 0 (striped disk array without fault tolerance)

36
Q

Disk mirroring used to connect multiple drives to the same disk controller card
Action on primary drive is duplicated on other drive
Primary drive can fail and data will not be lost

A

RAID Level 1 (mirroring)

37
Q

Variation of RAID Level 1
Separate cards used for each disk
Protects against controller card failures

A

Disk duplexing

38
Q
Distributes parity (error checking) across all drives
Data stored on one drive and its parity information stored on another drive
A

RAID Level 5 (independent disks with distributed parity)

39
Q

Nested-level R A I D
Mirrored array whose segments are RAID 0 arrays
Can achieve high data transfer rates

A

RAID 0+1 (high data transfer)

40
Q

May be necessary due to critical nature of connectivity today
Wait in the background during normal operations
Use a replication scheme to keep live network information current
Launch automatically in the event of a disaster
Hardware components are duplicated

A

Redundant networks

41
Q

(S D N s)

A

Software defined networks

42
Q

what controller can increase network reliability and may lessen the need for redundant equipment

A

Software defined networks (S D N s)

43
Q

(U P S)

A

Uninterruptible power supply

44
Q

Maintains power to equipment in the event of an interruption in primary electrical power source

A

Uninterruptible power supply (U P S)

45
Q

Least expensive, simplest solution
Charged by main power supply
Begins supplying power quickly when primary power is interrupted
Switches back to standby mode when primary power is restored

A

Off-line U P S

46
Q

Always running off its battery while main power runs battery charger
Not affected by dips or sags in voltage
Can serve as a surge protector

A

On-line U P S

47
Q

Powered by diesel, natural gas, or propane

A

Backup generator

48
Q

Backup sites may be necessary if flood, hurricane, or other major disaster damages buildings

A

• Recovery Sites

49
Q

Generally run by a commercial disaster recovery service
Duplicate of the production site
Has all needed equipment
Data backups can be moved quickly to the hot site

A

Hot site

50
Q
Provides office space
Customer must provide and install all equipment needed to continue operations
No backups immediately available
Less expensive than a hot site
Takes longer to resume full operation
A

Cold site

51
Q

All equipment is installed
No active Internet or telecommunications facilities
No current data backups
Less expensive than a hot site
Time to turn on connections and install backups can be half a day or more

A

Warm site

52
Q

copying information to a different medium and storing it at an off-site location
So that it can be used in the event of a disaster

A

Data backup

53
Q

(R P O)

A

Recovery point objective

54
Q

(R T O)

A

Recovery time objective

55
Q

startup point for all backups

A

full backup

56
Q

back ups any data that has changed since last full backup

A

differential backup

57
Q

backs up any data that has changed since last full backup or last incremental backup

A

incremental backup

58
Q

(C D P)

A

continuous data protection

59
Q

Performs continuous backups that can be restored immediately
Maintains a historical record of all changes made to data
Creates a snapshot of the data (like a reference marker)

A

continuous data protection (C D P)

60
Q

Methods to prevent disruption through environmental controls

A

Fire suppression
Electromagnetic disruption protection
Proper configuration of H V A C systems
FM200 system

61
Q

the attempts to reduce the impact of a fire

A

• Fire Suppression

62
Q

(E M I)

A

Electromagnetic interference

63
Q

(E M P)

A

electromagnetic pulse

64
Q

Caused by a short-duration burst of energy by the source called

A

electromagnetic pulse (E M P)

65
Q

(E M C)

A

Electromagnetic compatibility

66
Q

Reducing or eliminating the unintentional generation, spread, and reception of electromagnetic energy

A

Electromagnetic compatibility (E M C)

67
Q

Metal enclosure that prevents entry or escape of electromagnetic fields
Often used for testing in electronic labs

A

Faraday cage

68
Q

(H V A C)

A

Heating, ventilating, and air conditioning

69
Q

Maintain temperature and relative humidity at required levels

A

Heating, ventilating, and air conditioning (H V A C) systems

70
Q

Used to reduce heat by managing air flow
Servers lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing other direction

A

Hot aisle/cold aisle layout

71
Q

Involves using forensics and following proper incident response procedures

A

Incident response

72
Q

Applying science to legal questions

Analyzing evidence and can be applied to technology

A

• Forensic Science

73
Q

Uses technology to search for computer evidence of a crime

A

Computer forensics

74
Q

(I R P)

A

Incident response plan

75
Q

A set of written instructions for reacting to a security incident

A

Incident response plan (I R P)

76
Q

Incident response process

A
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned
77
Q

what is the first order of volatility

A

register, cache, peripheral memory

78
Q

what is the second order of volatility

A

random access memory (RAM)

79
Q

what is the third order of volatility

A

network state

80
Q

what is the fourth order of volatility

A

running processes

81
Q

to guarantee accuracy of a backup what would you do to backup programs rely upon hashing algorithms as part of the validation process

A

Mirror image backup

82
Q

Documents that the evidence was maintained under strict control at all times
No unauthorized person was given opportunity to corrupt the evidence

A

Chain of custody

83
Q

The collection, processing, analysis, and dissemination of intelligence for forming policy changes

A

Strategic intelligence

84
Q

Involves gaining information about the attacker’s intelligence collection capabilities

A

Strategic counterintelligence

85
Q

Maintaining active logs regarding the reconnaissance activities conducted by the attacker

A

Active logging