Ch.13 Flashcards

1
Q

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

Question 1 options:

Business continuity planning and testing

Disaster planning

Business management planning and testing

Enterprise disaster planning

A

Business continuity planning and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of it’s operational and financial position, what should be performed?

Question 2 options:

Business risk analysis

Business alert assessment

Business productivity analysis

Business impact analysis (BIA)

A

Business impact analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of plans include procedures to address redundancy and fault tolerance as well as data backups?

Question 3 options:

Enterprise recovery

Disaster recovery

Business recovery

Emergency recovery

A

Disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?

Question 4 options:

recovery site

recovery point

single point of failure

cascade point of failure

A

single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:

Question 5 options:

service level agreement

recovery point objective

recovery time objective

service point agreement

A

service level agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:

Question 6 options:

symmetric network

symmetric server

asymmetric network

asymmetric server

A

asymmetric server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what type of server cluster can services fail over from downed servers to functional servers?

Question 7 options:

symmetric network

asymmetric network

symmetric server

symmetric network

A

symmetric server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can an administrator keep devices powered when power is interrupted?

Question 8 options:

uninterruptible power supply

redundant power supply

uninterruptible system supply

replica power supply

A

uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

Question 9 options:

cold site

hot site

spare site

warm site

A

warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

Question 10 options:

bollard

mantrap

Faraday cage

Newton cage

A

Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

Question 11 options:

Computer forensics

Penetration testing

Vulnerability testing

Risk management

A

Computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?

Question 12 options:

65

75

85

95

A

85

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of data can be lost when a computer is turned off?

Question 13 options:

Volatile

Static

Non-volatile

Persistent

A

Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

Question 14 options:

system standard

system view

system image

system baseline

A

system image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

Question 15 options:

baseline

mirror image

logical image

thin image

A

mirror image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

Question 16 options:

chain of value

chain of use

chain of property

chain of custody

A

chain of custody

17
Q

Multiple sectors on a disk, when combined, are referred to as a:

Question 17 options:

cluster

track

slice

platter

A

cluster

18
Q

The remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?

Question 18 options:

Disk slack

RAM slack

ROM slack

Edge slack

A

RAM slack

19
Q

What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?

Question 19 options:

RAM slack

Edge slack

Drive file slack

Sector slack

A

Drive file slack

20
Q

What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

Question 20 options:

​RAID 0

​RAID 1

​RAID 2

​RAID 5

A

​RAID 5