Ch 14 Key Terms Flashcards

1
Q

the activity that serves as the core purpose of the enterprise

identification of critical systems

high availability

mission-essential function

single point of failure

A

mission-essential function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can achieve high data transfer rates because there are multiple stripe segments

RAID 0

RAID 5

RAID 6

RAID 0 + 1

A

RAID 0 + 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

development of strategic plans that provide alternative modes of operation

Business Continuity

Business Impact

BCP

Diaster Recovery

A

BCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company’s AUP requires:

  • Passwords must meet complexity requirements.
  • Passwords are changed at least once every six months.
  • Passwords must be at least eight characters long.

An auditor is reviewing the following report:

Question_Chap11_179.JPG

Which of the following controls should the auditor recommend to enforce the AUP?

Account recovery

Prohibit password reuse

Password expiration

Account lockout thresholds

A

Password expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wellbeing

impact on finance

impact on property

impact on safety

impact on life

A

impact on life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the combination of two or more servers that are interconnected to appear as one

clustering

server cluster

interconnectivity of servers (IOS)

server clusterfication

A

server cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

striped disk array without fault tolerance

RAID 1

RAID 0 + 1

RAID 0

RAID 5

A

RAID 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

combining two or more devices to appear as a single unit

clustermizatoin

clustering

interconnectivity

server cluster

A

clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

least expensive and simplest solution; connected to the power source to charge its battery

UPS

UPC

off-line UPS

APC

A

off-line UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

moving data input and output processes from the primary location to an ALT processing site

failback

failed asset computation

flatulancemocytism

failover

A

failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physical protection

impact on finance

impact on status

impact on safety

impact on property

A

impact on safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

to analyze the exercise results with the purpose of identifying strengths and weaknesses

after action report

failover

Nat’s hypothesis

tabletop exercises

A

after action report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use of duplicated equipment to improve the availability of the system

fault tolerance

redundancy

after action report

single point of failure

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the average amount of time until a component fails

BFF

MTTR

MITR

MTBF

A

MTBF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

every server in the cluster performs useful work

sysmmetric cluster

sysmmetric server cluster

server cluster

asymmetric server cluster

A

sysmmetric server cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

generally run by a commercial disaster recovery service that allows a business to continue

warm site

hot site

cold site

hybrid site

A

hot site

17
Q

tangible assets

impact on status

impact on safety

impact on property

impact on finance

A

impact on property

18
Q

the maximum length of time that an organization can tolerate between backups

RTO

RPO

RRO

RPA

A

RPO

19
Q

a service contract between a vendor and a client that specifies what services will be provided

MOU

SLA

MOA

SAL

A

SLA

20
Q

the recovery of critical assets

BIA

Business Continuity

disaster recovery

BCP

A

disaster recovery

21
Q

always running off its battery while the main power runs the battery charger

UPC

APC

on-line UPS

off-line UPS

A

on-line UPS

22
Q

requires a specialized hardware controller either on PC or on the array that holds the RAID drives

software-based RAID

Redundancy Controllers

hardware-based RAID

Dual Controllers

A

hardware-based RAID

23
Q

an entity in a system which, if it no longer functions, will disable the entire system

high availability

single point of failure

mission-essential function

identification of critical systems

A

single point of failure

24
Q

uses block-level striping with two parity blocks distributed across all member disks

RAID 5

RAID 0

RAID 6

RAID 0 + 1

A

RAID 6

25
Q

a standby server exists only to take over for another server in the event of its failure

asymmetric server cluster

sysmmetric server cluster

serverphobia

server cluster

A

asymmetric server cluster

26
Q

the process of resynchronizing data back to the primary location

failover

feverdiscodancing

failback

failed asset computation

A

failback

27
Q

A security analyst is reviewing the following output from an IPS:

Picture1.jpg

Given this output, which of the following can be concluded? (Select two.)

The source IP of the attack is coming from 250.19.18.22.

The source IP of the attack is coming from 250.19.18.71.

The attacker sent a malformed IGAP packet, triggering the alert.

The attacker sent a malformed TCP packet, triggering the alert.

The TTL value is outside of the expected range, triggering the alert.

A

The source IP of the attack is coming from 250.19.18.71. & The attacker sent a malformed IGAP packet, triggering the alert.

28
Q

the process of identifying exposure to threats, creating preventive and recovery procedures

Business Continuity

DRP

Business Impact

BCP

A

BCP

29
Q

simulate an emergency situation but in an informal and stress-free environment

after action report

redundant simulation

fault tolerance

tabletop exercises

A

tabletop exercises

30
Q

uses multiple hard disk drives for increased reliability and performances

RAU

RAID

Data Recovery

Redandant of Array of Dependent Drives

A

RAID

31
Q

used to identify and mitigate privacy risks

alternative processing site

alternative business practices

privacy impact assessment

privacy threshold assessment

A

privacy impact assessment

32
Q

the average amount of time that it will take a device to recover from a failure

MTTR

BFF

MITR

MTBF

A

MTTR

33
Q

a system that can function for an extended period with little downtime

high availability

mission-essential function

identification of critical systems

single point of failure

A

high availability