Ch.13 Flashcards
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
Question 1 options:
Business continuity planning and testing
Disaster planning
Business management planning and testing
Enterprise disaster planning
Business continuity planning and testing
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of it’s operational and financial position, what should be performed?
Question 2 options:
Business risk analysis
Business alert assessment
Business productivity analysis
Business impact analysis (BIA)
Business impact analysis (BIA)
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?
Question 3 options:
Enterprise recovery
Disaster recovery
Business recovery
Emergency recovery
Disaster recovery
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?
Question 4 options:
recovery site
recovery point
single point of failure
cascade point of failure
single point of failure
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:
Question 5 options:
service level agreement
recovery point objective
recovery time objective
service point agreement
service level agreement
Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:
Question 6 options:
symmetric network
symmetric server
asymmetric network
asymmetric server
asymmetric server
In what type of server cluster can services fail over from downed servers to functional servers?
Question 7 options:
symmetric network
asymmetric network
symmetric server
symmetric network
symmetric server
How can an administrator keep devices powered when power is interrupted?
Question 8 options:
uninterruptible power supply
redundant power supply
uninterruptible system supply
replica power supply
uninterruptible power supply
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:
Question 9 options:
cold site
hot site
spare site
warm site
warm site
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
Question 10 options:
bollard
mantrap
Faraday cage
Newton cage
Faraday cage
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:
Question 11 options:
Computer forensics
Penetration testing
Vulnerability testing
Risk management
Computer forensics
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?
Question 12 options:
65
75
85
95
85
What kind of data can be lost when a computer is turned off?
Question 13 options:
Volatile
Static
Non-volatile
Persistent
Volatile
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
Question 14 options:
system standard
system view
system image
system baseline
system image
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?
Question 15 options:
baseline
mirror image
logical image
thin image
mirror image