Chapter 12 - Disaster Recovery and Incident Response Flashcards

1
Q

What is Business Continuity in a nut shell?

A

page 431

Having a backup plan when a key component is missing, absent, or failure, and the business continues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the process of implementing policies, controls and procedures to counteract the effects of losses, outages or failures of critical business processes?

A

page 431

Business Continuity Planning (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two key components of BCP?

A

page 431
Business Impact Analysis (BIA)
Rick Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some good reasons to have backups?

A

page 432
Accidental deletion Application errors
Natural disasters Physical attacks
Server failure Virus infection
Workstation failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are sometimes referred to as shadows?

A

page 432

Working copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AT what temperature does paper catch fire?

A

page 433

451 degrees Fahrenheit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ideal medium for on-site storage?

A

page 433

tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the major component of a disaster recovery plan?

A

page 434

access and storage information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the different types of Backups

A
page 436
Full backup
Differential backup
Incremental backup
Hierachical Storage Management (HSM)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the Grandfather, Father and Son Backup

A

page 438
The most recent backup after a full backup is SON
As newer backup are made, the SON becomes the FATHER, in turn becomes the GRANDFATHER
- Annual Backup is referred to as GRANDFATHER
- Monthly Backup is referred to as FATHER
- Weekly Backup is referred to as SON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a backout?

A

page 443

Is a reversion from a change that had negative consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Hot-Site?

A

page 443
Is a location that can provide operations within hours of failure.
Often referred to as an active Active Backup Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Warm SIte?

A

page 444

Provides some of the capabilities of a hot site, but it requires the customer to do more work to become operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Reciprocal Agreement?

A

page 444

An agreement between 2 companies to provide services in the event of an emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Cold Site?

A

page 444

Is a facility that isn’t ready for use, the organization using it must bring along its equipment and network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What important items should an Incident Response Policy establish?

A

page 446

  • Outside agencies that should be contacted or notified in case of an incident.
  • Resources used to deal with an incident.
  • List of information that should be collected about an incident.
  • Policies and guidelines regarding how to handle an incident.
17
Q

What can be formalized or an Ad Hoc team?

A

page 446

Computer Security Incident Response Team (CSIRT)

18
Q

What are the 5 Steps Incident Response?

A

page 448

  1. Identifying the Incident
  2. Investigating the Incident
  3. Repairing the Damage
  4. Documenting and Repairing the Response
  5. Adjusting Procedures
19
Q

What is OOV?

A

page 453
Order of Volatility
The amount of time that you have to collect certain data before a window of opportunity is gone.

20
Q

What is “Capture System Image”?

A

page 453
Capturing an image of the operating system in its exploited state can be helpful in revisiting the issue after the fact to learn more about it.

21
Q

Why is Documenting Network Traffic and logs valuable in forensics?

A

page 453

This information can be useful in identifying trends associated with repeated attacks

22
Q

Why would you want to capture video in forensics?

A

page 453
Video can latter be analyzed manually in individual frames as well as run through a number of programs that can create indices of the contents.

23
Q

Why is important to record the time offset during forensics?

A

page 453

To able to follow events in the correct time sequence.

24
Q

What are the 5 levels of testing during a Tabletop exercise simulation of a disater?

A

page 454

  • Document Review
  • Simulation
  • Parallel Text
  • Cutover Test
25
Q

What is Penetration Testing?

A

page 458

Using the same techniques a hacker would use to penetrate your system.