Ch.13 Flashcards

1
Q

the ability of an organization to maintain its operations and services in the face of a disruptive event

A

business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient

A

business continuity planning and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an analysis that identifies mission-critical business functions and quantifies the impact a loss of such functions may have on the organization in terms of its operational and financial position

A

business impact analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

combining two or more servers to appear as one single unit

A

clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a remote site that provides office space; the customer must provide and install all the equipment needed to continue operations

A

cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

using technology to search for computer evidence of a crime

A

computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the ability of a business to continue to function in the event of a disaster

A

continuity of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the process of copying information to a different medium and storing it (preferably at an offsite location) so that it can be used in the event of a disaster

A

data backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a written document that details the process for restoring IT resources following an event that causes a significant disruption in service

A

disaster recovery plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a metallic enclosure that prevents the entry or escape of an electromagnetic field

A

Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the application of science to questions that are of interest to the legal profession

A

forensics (forensic science)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

systems that provide and regulate heating and cooling

A

heating, ventilation, and air conditioning (HVAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a system that can function for an extended period of time with little downtime

A

high availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a layout in a data center that can be used to reduce heat by managing air flow

A

hot aisle/cold aisle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link

A

hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the process of developing an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT

A

IT contingency planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a statistical value that is the average time until a component fails, cannot be repaired, and must be replaced

A

mean time between failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the average time for a device to recover from a failure that is not a terminal failure

A

mean time to recovery (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the sequence of volatile data that must be preserved in a computer forensic investigation

A

order of volatility

21
Q

a technology that uses multiple hard disk drives for increased reliability and performance

A

RAID (Redundant Array of Independent Drives)

22
Q

the maximum length of time that an organization can tolerate between backups

A

recovery point objective (RPO)

23
Q

the length of time it will take to recover data that has been backed up

A

recovery time objective (RTO)

24
Q

the process of identifying threats

A

risk assessment

25
Q

a component or entity in a system which , if it no longer functions, would adversely affect the entire system

A

single point of failure

26
Q

determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees

A

succession planning

27
Q

a snapshot of the current sate of the computer that contains all settings and data

A

system image

28
Q

exercises that simulate an emergency situation but in an informal and stress-free environment

A

tabletop execises

29
Q

a remote site that contains computer equipment but does not have active Internet or telecommunication facilities and does not have backups of data

A

warm site

30
Q

_____ is the process of developing an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT.

a. Disaster recovery planning
b. IT contingency planning
c. Business impact analysis planning
d. Risk IT planning

A

b

31
Q

Who should be involved in a table top exercise?

a. all employees
b. individuals on a decision-making level
c. full-time employees
d. only IT managers

A

b

32
Q

The average amount of time that it will take a device to recover from a failure that is not a terminal failure is called the _____.

a. MTTR
b. MTBR
c. MTBF
d. MTTI

A

a (mean time to recovery)

33
Q

Each of these is a category of fire suppression systems EXCEPT a _____.

a. water sprinkler system
b. wet chemical system
c. clean agent system
d. dry chemical system

A

b

34
Q

Which of these is NOT required for a fire to occur?

a. a chemical reaction that is the fire itself
b. a type of fuel or combustible material
c. a spark to start the process
d. sufficient oxygen to sustain the combustion

A

c

35
Q

An electrical fire like that which would be found in a computer data center is known as what type of fire?

a. Class A
b. Class B
c. Class C
d. Class D

A

c

36
Q

Which level of RAID uses disk mirroring and is considered fault-tolerant?

a. Level 1
b. Level 2
c. Level 3
d. Level 4

A

a

37
Q

A standby server that exists only to take over for another server in the event of its failure is known as a(n)_____.

a. rollover server
b. asymmetric server cluster
b. symmetric server cluster
d. failsafe server

A

b

38
Q

What does the abbreviation RAID represent?

a. Redundant Array of IDE Drives
b. Resilient Architecture for Interdependent Discs
c. Redundant Array of Independent Drives
d. Resistant Architecture of Inter-Related Data Storage

A

c

39
Q

Which of these is an example of a nested RAID?

a. Level 1-0
b. Level 0-1
c. Level 0+1
d. Level 0/1

A

c

40
Q

A(n) _____ is always running off its battery while the main power runs the battery charger.

a. secure UPS
b. backup UPS
c. off-line UPS
d. on-line UPS

A

d

41
Q

Which type of site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running?

a. cold site
b. warm site
c. hot site
d. replicated site

A

c

42
Q

A UPS can perform each of the following EXCEPT _____.

a. prevent certain applications from launching that will consume too much power
b. disconnect users and shut down the server
c. prevent any new users from logging on
d. notify all users that they must finish their work immediately and log off

A

a

43
Q

Which of these is NOT characteristic of a disaster recovery plan (DRP)?

a. It is updated regularly
b. It is a private document used only by top-level administrators for planning
c. It is written
d. It is detailed.

A

b

44
Q

What does an incremental backup do?

a. copies all files changed since the last full or incremental backup
b. copies selected files
c. copies all files
d. copies all files since the last full backup

A

d

45
Q

Which question is NOT a basic question to be asked regarding creating a data backup?

a. What media should be used?
b. How long will it take to finish the backup?
c. Where should the back be stored?
d. What information should be backed up

A

b

46
Q

The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

a. forensics
b. evidence
c. custody
d. conrol

A

c

47
Q

What is the maximum length of time that an organization can tolerate between data backups?

a. recovery time objective (RTO)
b. recovery service point (RSP)
c. recovery point objective (RPO)
d. optimal recovery timeframe (ORT)

A

c

48
Q

What data backup solution uses the magnetic disk as a temporary storage area?

a. continuous data protection (CDP)
b. disk to disk to tape (D2D2T)
c. disk to disk (D2D)
d. tape to disk (T2D)

A

b

49
Q

When an unauthorized event occurs, what is the first duty of the computer forensics response team?

a. to log off from the server
b. to secure the crime scene
c. to back up the hard drive
d. to reboot the sytem

A

b