Chapter 18 Disaster Recovery Planning Flashcards

1
Q

This is also called striping. It uses two or more disks and improves the disk subsystem
performance, but it does not provide fault tolerance.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is also called striping with parity. It uses three or more disks with the equivalent of one disk holding parity information. If any single disk fails, the RAID array will
continue to operate, though it will be slower.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is configured as
two or more mirrors configured in a striped configuration. It uses at least four disks but can support more as long as an even number of disks are added. It will continue to operate even if multiple disks fail, as long as at least one drive in each mirror
continues to function.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is also called mirroring. It uses two disks, which both hold the same data.
If one disk fails, the other disk includes the data so a system can continue to operate after
a single disk fails.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ require the operating system to manage the disks in the array and can reduce overall
system performance.

software-based RAID
hardware-based RAID

A

software-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ typically include spare drives that can be logically added
to the array

software-based RAID
hardware-based RAID

A

hardware-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

arrays support hot swapping, allowing technicians to replace failed disks
without powering down the system

software-based RAID
hardware-based RAID

A

hardware-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ are relatively inexpensive since

software-based RAID
hardware-based RAID

A

software-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is a quick instance of an

increase in voltage.

A

spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is a quick instance of a reduction in voltage.

A

sag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If power stays high for a long period of time, it’s called a ____

A

surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If power stays low for a long period of time, it’s called a ____

A

brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _______
system will default to a secure state in the event of a failure, blocking all access.

fail-secure
fail-open

A

fail-secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system will fail in an open state, granting all access. The choice is dependent on
whether security or availability is more important after a failure.

fail-secure
fail-open

A

fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ includes mechanisms
to ensure that specific objects are protected to prevent their loss.

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Automated Recovery without Undue Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ ensures that the system is able to successfully complete
the recovery for the functions, or that the system will be able to roll back the changes to
return to a secure state.

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Function Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

in ______ an administrator
is required to manually perform the actions necessary to implement a secured or
trusted recovery after a failure or system crash.

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Manual Recovery

18
Q

The system is able to perform trusted recovery activities to restore
itself against at least one type of failure

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Automated Recovery

19
Q

In an _____ scenario, database backups are moved to a remote site using bulk
transfers

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

electronic vaulting

20
Q

Data transfers still occur in a bulk transfer mode, but they occur on a more frequent basis, usually
once every hour and sometimes more frequently.

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

Remote Journaling

21
Q

______ a live database server is maintained
at the backup site. The remote server receives copies of the database modifi cations at
the same time they are applied to the production server at the primary site.

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

Remote Mirroring

22
Q

_____ setups transfer copies
of the database transaction logs containing the transactions that occurred since the previous
bulk transfer.

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

Remote Journaling

23
Q

__________ store all files that have been modified since the
time of the most recent full backup.

Differential Backups
Full Backups
Incremental Backups

A

Differential backups

24
Q

_________ process does not change the archive bit.

Differential Backups
Full Backups
Incremental Backups

A

Differential backups

25
Q

____________ store only those files that have been modified
since the time of the most recent full or incremental backup.

Differential Backups
Full Backups
Incremental Backups

A

Incremental Backups

26
Q

_______ store a complete copy of the data contained
on the protected device.

Differential Backups
Full Backups
Incremental Backups

A

Full Backups

27
Q

If you use a combination of full

and differential backups, you will need to restore _______ and ________ .

A

the most recent full

backup and the most recent differential backup

28
Q

if your strategy combines

full backups with incremental backups, you will need to restore _______as well as _______.

A

the most recent full

backup as well as all incremental backups performed since that full backup

29
Q

Under a _______ the developer

provides copies of the application source code to an independent third-party organization.

A

software escrow agreement,

30
Q

_____ involves bringing business operations and processes back to a working state. _____ involves bringing a business facility and environment
back to a workable state.

A

recovery , Restoration

31
Q

involve actually shutting down
operations at the primary site and shifting them to the recovery site.

read-through test
structured walk-through
Simulation test
Parallel tests
Full-interruption tests
A

Full-interruption tests

32
Q

Involve relocating personnel to the alternate recovery site and implementing site activation procedures. Employees relocated
to the site perform their disaster recovery responsibilities just as they would for an actual
disaster. The only difference is that operations at the main facility are not interrupted.

read-through test
structured walk-through
Simulation test
Parallel tests
Full-interruption tests
A

Parallel Test

33
Q

Disaster recovery team members are presented with a scenario and asked to develop an appropriate
response and may involve the interruption of noncritical business activities and the use
of some operational personnel.

read-through test
structured walk-through
Simulation test
Parallel tests
Full-interruption tests
A

Simulation Test

34
Q

Members of the disaster recovery team gather in a large conference
room and role-play a disaster scenario.

read-through test
structured walk-through
Simulation test
Parallel tests
Full-interruption tests
A

structured walk-through

35
Q

you distribute copies of disaster recovery plans to the members of the disaster recovery team for review

read-through test
structured walk-through
Simulation test
Parallel tests
Full-interruption tests
A

read-through test

36
Q

Some packets may be lost between source and destination, requiring
retransmission.

Bandwidth
Latency
Jitter
Packet Loss
Interference
A

Packet Loss

37
Q

The network capacity available to carry communications.

Bandwidth
Latency
Jitter
Packet Loss
Interference
A

Bandwidth

38
Q

Electrical noise, faulty equipment, and other factors may corrupt the contents
of packets.

Bandwidth
Latency
Jitter
Packet Loss
Interference
A

Interference

39
Q

The variation in latency between different packets.

Bandwidth
Latency
Jitter
Packet Loss
Interference
A

Jitter

40
Q

Some packets may be lost between source and destination, requiring
retransmission.

Bandwidth
Latency
Jitter
Packet Loss
Interference
A

Packet Loss