Chapter 18 Disaster Recovery Planning Flashcards

1
Q

This is also called striping. It uses two or more disks and improves the disk subsystem
performance, but it does not provide fault tolerance.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is also called striping with parity. It uses three or more disks with the equivalent of one disk holding parity information. If any single disk fails, the RAID array will
continue to operate, though it will be slower.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is configured as
two or more mirrors configured in a striped configuration. It uses at least four disks but can support more as long as an even number of disks are added. It will continue to operate even if multiple disks fail, as long as at least one drive in each mirror
continues to function.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is also called mirroring. It uses two disks, which both hold the same data.
If one disk fails, the other disk includes the data so a system can continue to operate after
a single disk fails.

RAID-0
RAID-1
RAID-5
RAID-10

A

RAID-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ require the operating system to manage the disks in the array and can reduce overall
system performance.

software-based RAID
hardware-based RAID

A

software-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ typically include spare drives that can be logically added
to the array

software-based RAID
hardware-based RAID

A

hardware-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

arrays support hot swapping, allowing technicians to replace failed disks
without powering down the system

software-based RAID
hardware-based RAID

A

hardware-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ are relatively inexpensive since

software-based RAID
hardware-based RAID

A

software-based RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is a quick instance of an

increase in voltage.

A

spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is a quick instance of a reduction in voltage.

A

sag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If power stays high for a long period of time, it’s called a ____

A

surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If power stays low for a long period of time, it’s called a ____

A

brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _______
system will default to a secure state in the event of a failure, blocking all access.

fail-secure
fail-open

A

fail-secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system will fail in an open state, granting all access. The choice is dependent on
whether security or availability is more important after a failure.

fail-secure
fail-open

A

fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ includes mechanisms
to ensure that specific objects are protected to prevent their loss.

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Automated Recovery without Undue Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ ensures that the system is able to successfully complete
the recovery for the functions, or that the system will be able to roll back the changes to
return to a secure state.

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Function Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

in ______ an administrator
is required to manually perform the actions necessary to implement a secured or
trusted recovery after a failure or system crash.

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Manual Recovery

18
Q

The system is able to perform trusted recovery activities to restore
itself against at least one type of failure

Manual Recovery
Automated Recovery
Automated Recovery without Undue Loss
Function Recovery

A

Automated Recovery

19
Q

In an _____ scenario, database backups are moved to a remote site using bulk
transfers

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

electronic vaulting

20
Q

Data transfers still occur in a bulk transfer mode, but they occur on a more frequent basis, usually
once every hour and sometimes more frequently.

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

Remote Journaling

21
Q

______ a live database server is maintained
at the backup site. The remote server receives copies of the database modifi cations at
the same time they are applied to the production server at the primary site.

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

Remote Mirroring

22
Q

_____ setups transfer copies
of the database transaction logs containing the transactions that occurred since the previous
bulk transfer.

Remote Mirroring
Electronic Vaulting
Remote Journaling

A

Remote Journaling

23
Q

__________ store all files that have been modified since the
time of the most recent full backup.

Differential Backups
Full Backups
Incremental Backups

A

Differential backups

24
Q

_________ process does not change the archive bit.

Differential Backups
Full Backups
Incremental Backups

A

Differential backups

25
____________ store only those files that have been modified since the time of the most recent full or incremental backup. Differential Backups Full Backups Incremental Backups
Incremental Backups
26
_______ store a complete copy of the data contained on the protected device. Differential Backups Full Backups Incremental Backups
Full Backups
27
If you use a combination of full | and differential backups, you will need to restore _______ and ________ .
the most recent full | backup and the most recent differential backup
28
if your strategy combines | full backups with incremental backups, you will need to restore _______as well as _______.
the most recent full | backup as well as all incremental backups performed since that full backup
29
Under a _______ the developer | provides copies of the application source code to an independent third-party organization.
software escrow agreement,
30
_____ involves bringing business operations and processes back to a working state. _____ involves bringing a business facility and environment back to a workable state.
recovery , Restoration
31
involve actually shutting down operations at the primary site and shifting them to the recovery site. ``` read-through test structured walk-through Simulation test Parallel tests Full-interruption tests ```
Full-interruption tests
32
Involve relocating personnel to the alternate recovery site and implementing site activation procedures. Employees relocated to the site perform their disaster recovery responsibilities just as they would for an actual disaster. The only difference is that operations at the main facility are not interrupted. ``` read-through test structured walk-through Simulation test Parallel tests Full-interruption tests ```
Parallel Test
33
Disaster recovery team members are presented with a scenario and asked to develop an appropriate response and may involve the interruption of noncritical business activities and the use of some operational personnel. ``` read-through test structured walk-through Simulation test Parallel tests Full-interruption tests ```
Simulation Test
34
Members of the disaster recovery team gather in a large conference room and role-play a disaster scenario. ``` read-through test structured walk-through Simulation test Parallel tests Full-interruption tests ```
structured walk-through
35
you distribute copies of disaster recovery plans to the members of the disaster recovery team for review ``` read-through test structured walk-through Simulation test Parallel tests Full-interruption tests ```
read-through test
36
Some packets may be lost between source and destination, requiring retransmission. ``` Bandwidth Latency Jitter Packet Loss Interference ```
Packet Loss
37
The network capacity available to carry communications. ``` Bandwidth Latency Jitter Packet Loss Interference ```
Bandwidth
38
Electrical noise, faulty equipment, and other factors may corrupt the contents of packets. ``` Bandwidth Latency Jitter Packet Loss Interference ```
Interference
39
The variation in latency between different packets. ``` Bandwidth Latency Jitter Packet Loss Interference ```
Jitter
40
Some packets may be lost between source and destination, requiring retransmission. ``` Bandwidth Latency Jitter Packet Loss Interference ```
Packet Loss