Chapter 18 Disaster Recovery Planning Flashcards
This is also called striping. It uses two or more disks and improves the disk subsystem
performance, but it does not provide fault tolerance.
RAID-0
RAID-1
RAID-5
RAID-10
RAID-0
This is also called striping with parity. It uses three or more disks with the equivalent of one disk holding parity information. If any single disk fails, the RAID array will
continue to operate, though it will be slower.
RAID-0
RAID-1
RAID-5
RAID-10
RAID-5
_______ is configured as
two or more mirrors configured in a striped configuration. It uses at least four disks but can support more as long as an even number of disks are added. It will continue to operate even if multiple disks fail, as long as at least one drive in each mirror
continues to function.
RAID-0
RAID-1
RAID-5
RAID-10
RAID-10
This is also called mirroring. It uses two disks, which both hold the same data.
If one disk fails, the other disk includes the data so a system can continue to operate after
a single disk fails.
RAID-0
RAID-1
RAID-5
RAID-10
RAID-1
__________ require the operating system to manage the disks in the array and can reduce overall
system performance.
software-based RAID
hardware-based RAID
software-based RAID
_________ typically include spare drives that can be logically added
to the array
software-based RAID
hardware-based RAID
hardware-based RAID
arrays support hot swapping, allowing technicians to replace failed disks
without powering down the system
software-based RAID
hardware-based RAID
hardware-based RAID
_____ are relatively inexpensive since
software-based RAID
hardware-based RAID
software-based RAID
A ____ is a quick instance of an
increase in voltage.
spike
A ____ is a quick instance of a reduction in voltage.
sag
If power stays high for a long period of time, it’s called a ____
surge
If power stays low for a long period of time, it’s called a ____
brownout
A _______
system will default to a secure state in the event of a failure, blocking all access.
fail-secure
fail-open
fail-secure
A system will fail in an open state, granting all access. The choice is dependent on
whether security or availability is more important after a failure.
fail-secure
fail-open
fail-open
_____ includes mechanisms
to ensure that specific objects are protected to prevent their loss.
Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery
Automated Recovery without Undue Loss
______ ensures that the system is able to successfully complete
the recovery for the functions, or that the system will be able to roll back the changes to
return to a secure state.
Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery
Function Recovery
in ______ an administrator
is required to manually perform the actions necessary to implement a secured or
trusted recovery after a failure or system crash.
Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery
Manual Recovery
The system is able to perform trusted recovery activities to restore
itself against at least one type of failure
Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery
Automated Recovery
In an _____ scenario, database backups are moved to a remote site using bulk
transfers
Remote Mirroring
Electronic Vaulting
Remote Journaling
electronic vaulting
Data transfers still occur in a bulk transfer mode, but they occur on a more frequent basis, usually
once every hour and sometimes more frequently.
Remote Mirroring
Electronic Vaulting
Remote Journaling
Remote Journaling
______ a live database server is maintained
at the backup site. The remote server receives copies of the database modifi cations at
the same time they are applied to the production server at the primary site.
Remote Mirroring
Electronic Vaulting
Remote Journaling
Remote Mirroring
_____ setups transfer copies
of the database transaction logs containing the transactions that occurred since the previous
bulk transfer.
Remote Mirroring
Electronic Vaulting
Remote Journaling
Remote Journaling
__________ store all files that have been modified since the
time of the most recent full backup.
Differential Backups
Full Backups
Incremental Backups
Differential backups
_________ process does not change the archive bit.
Differential Backups
Full Backups
Incremental Backups
Differential backups
____________ store only those files that have been modified
since the time of the most recent full or incremental backup.
Differential Backups
Full Backups
Incremental Backups
Incremental Backups
_______ store a complete copy of the data contained
on the protected device.
Differential Backups
Full Backups
Incremental Backups
Full Backups
If you use a combination of full
and differential backups, you will need to restore _______ and ________ .
the most recent full
backup and the most recent differential backup
if your strategy combines
full backups with incremental backups, you will need to restore _______as well as _______.
the most recent full
backup as well as all incremental backups performed since that full backup
Under a _______ the developer
provides copies of the application source code to an independent third-party organization.
software escrow agreement,
_____ involves bringing business operations and processes back to a working state. _____ involves bringing a business facility and environment
back to a workable state.
recovery , Restoration
involve actually shutting down
operations at the primary site and shifting them to the recovery site.
read-through test structured walk-through Simulation test Parallel tests Full-interruption tests
Full-interruption tests
Involve relocating personnel to the alternate recovery site and implementing site activation procedures. Employees relocated
to the site perform their disaster recovery responsibilities just as they would for an actual
disaster. The only difference is that operations at the main facility are not interrupted.
read-through test structured walk-through Simulation test Parallel tests Full-interruption tests
Parallel Test
Disaster recovery team members are presented with a scenario and asked to develop an appropriate
response and may involve the interruption of noncritical business activities and the use
of some operational personnel.
read-through test structured walk-through Simulation test Parallel tests Full-interruption tests
Simulation Test
Members of the disaster recovery team gather in a large conference
room and role-play a disaster scenario.
read-through test structured walk-through Simulation test Parallel tests Full-interruption tests
structured walk-through
you distribute copies of disaster recovery plans to the members of the disaster recovery team for review
read-through test structured walk-through Simulation test Parallel tests Full-interruption tests
read-through test
Some packets may be lost between source and destination, requiring
retransmission.
Bandwidth Latency Jitter Packet Loss Interference
Packet Loss
The network capacity available to carry communications.
Bandwidth Latency Jitter Packet Loss Interference
Bandwidth
Electrical noise, faulty equipment, and other factors may corrupt the contents
of packets.
Bandwidth Latency Jitter Packet Loss Interference
Interference
The variation in latency between different packets.
Bandwidth Latency Jitter Packet Loss Interference
Jitter
Some packets may be lost between source and destination, requiring
retransmission.
Bandwidth Latency Jitter Packet Loss Interference
Packet Loss