Chapter 6 Disaster Recovery, Business Continuity & Ongoing Maintenance Flashcards

1
Q

Harold is creating a disaster recovery plan based on corporate requirements that service be restored in the shortest amount of time possible if the primary cloud data center is down. What disaster recovery model would you suggest to Harold?

A

Hot site

A hot site model is where two fully redundant cloud data centers are in sync with each other, with the standby site backing up the primary in real time in the event of a failure. The hot site offers the most redundancy of any model. It is also the most expensive option and is used when having your cloud computing operations go offline is not an option

Chapter 6 (page 187)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which disaster recovery measurement defines when you can expect your system to be back online after an outage?

A

recovery time objective

Or Restore Time Objective (RTO) is the amount of time a system can be offline during a disaster; it is the amount of time it takes to get operations back up and operational after a failure.

Chapter 6 (page 184)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which disaster recovery measurement defines the amount of lost data after a recovery?

A

recovery point objective

Or Restore Point Objective (RPO) is the restore point you recover to in the event of an outage. Basically, the RPO indicated the amount of data that may be lost when restarting the operation after a disaster.

Chapter 6 (page 184)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Long-term storage of cloud data is called what?

A

Archive

Data archiving moves inactive data, or data that is no longer being used, to a separate storage facility for a long-term storage.

Chapter 6 (page 191)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Jeff is preparing to update his company’s business continuity plan with details on their disaster recovery site. His plan is to have a facility ready with floor space, power, and cooling that has facilities for him to load in his server racks to restore service. What type of DR implementation is Jack deploying?

A

Cold site

The cold site model is where a backup data center is provisioned to take over operations in the event of a primary data center failure but the servers and infrastructure are not operational until needed. A cold site facility may not have any servers or infrastructure installed, so to recover from an outage, the cold site approach will need significant amounts of installation and preparation before it is ready to be utilized.

Chapter 6 (page 188)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BigCo has been performing an ongoing inventory of their public cloud assets and found a number of storage volumes, CPU allocations, VMs, and firewall instances that are not connected to any project and are not being used. What are these services called?

A

Orphaned resources

Orphaned resources are cloud-based services that are left over when a service terminates and are no longer needed or used. When you enable cloud-based resources such as servers, storage arrays, load balancers, content distribution, DNS, databases, or any other offerings, you may find it to be a challenge to monitor and manage all of these resources. When a service is no longer being used or was enabled for a short period of time, it is all too frequently the case that the service do not get terminated properly and remain active and chargeable even if they are not being used..

Chapter 6 (page 200)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which disaster recovery model is when the remote backup of the site is offline except for critical data storage, which is usually a database.

A

Warm site

A warm site approach to recovering from a primary data center outage is when the remote backup site is offline except for critical data storage, which is usually a database server at the primary data center.

Chapter 6 (page 187)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To allow data to be moved to long-term storage off-site, an ____ process is performed.

A

Archiving

Protecting your data is critical for any recover operations. Storage systems offer sophisticated data management techniques to protect you from losing critical data. When archiving data, the service may be provided by the cloud service provider with its storage or backup offerings.

Chapter 6 (page 191)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ ____ as a Service companies perform failover, testing, and restoration services.

A

Disaster Recovery

Disaster Recovery as a Service (DRaaS) are companies that offer consulting and management services aimed at assisting companies with their DR requirements. They have a large knowledge base and specialized in DR.

Chapter 6 (page 192)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ ____ is the ability for an organization to continue operations and be able to deliver products and services after an event that disrupts its operations. It is the planning and preparation for a failure or outage the steps for a business to quickly recover to an operational state

A

Business continuity

Business continuity is defined as preparing for a failure or outage and compiling the steps for a business to quickly recover to an operational state.
The business continuity plan is defined as the creation of a plan with the recognition that there are inherent threats and risks that can have a detrimental effect on a company; it defines how to protect the company assets and to be able to survive a disaster.

Chapter 6 (page 192)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ___ ____ SLA will outline the fundamental issues of determining the business impact, performing a risk assessment, managing the risk, and planning for a disaster.

A

Disaster Recovery

Also, the SLA will include metrics such as the RPs and RTOs for the services offered, and the SLA metrics are highly dependent on the type of offerings such as IaaS, PaaS, or SaaS

Chapter 6 (page 195)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security service providers offer account management as a standard offering and can do an inventory of accounts, groups, roles, federations, and two-factor accounts based on defined metrics. This is referred to as managing and removing ____ accounts.

A

inactive

Ongoing maintenance requires that accounts that are no longer used be removed or disabled. This is a standard best practice that allows for a clean configuration and reduces your cyber-attack exposure.

Chapter 6 (page 199)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is the transfer and synchronization of data between multiple data centers.

A

Replication

For disaster recovery purposes and data security, your data must be transferred, or replication, between data centers. Remote copies of data have traditionally been implemented with storage backup applications.

Chapter 6 (page 189)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ____ is the amount of data that can be lost because of an outage, and the ____ is a measure of the amount of time a system can be offline during an outage.

A

RPO
RTO

Recovery Point Objective (RPO) is the restore point you recover to in the event of an outage. Basically, the RPO indicated the amount of data that may be lost when restarting the operations after a disaster.
Recovery Time Objective (RTO) is the amount of time a system can be offline during a disaster; it is the amount of time it takes to get operations back up and operational after a failure.

Chapter 6 (page 184)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

By using a central server, you consolidate all of the ____ generated and have the ability to review and audit the collected data.

A

logs

Most computing, storage, and networking gear generates system log files detailing ongoing events.

Logging information from all the devices being monitored and managed is sent to central logging server and archived.

Chapter 6 (page 198)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ ____ are cloud-based services that are left over when a service terminates and are no longer needed or used.

A

Orphaned resources

When a service is no longer being used or was enabled for a short period of time, it is all too frequently the case that the services do not get terminated properly and remain active and chargeable even if they are not being used.

Chapter 6 (page 200)

17
Q

Data systems such as databases or storage volumes can be deployed in multiple data centers for fault tolerance. Implementing a/an ____ replication system will ensure that the data remains synchronized at all times.

A

Synchronous

Synchronous replication is the process of replicating data in real time from the primary storage system to a remote facility. Synchronous replications allow you to store current data at a remote location from the primary data center that can be brought online with a short recovery time and limited loss of data.

Chapter 6 (page 190)

18
Q

Data replication is often used to store copies of real-time data in remote zones. When there is a need to have the master data immediately updated, and then on the backend, update the remote zones, what type of replication would you recommend your operation department to configure?

A.  Synchronous
B.  Asynchronous
C.  Volume sync
D.  Mirroring
E.  RAID 5
A

Asynchronous

Asynchronous replication is when data is written to the primary first, and then later a copy is written to the remote site on a scheduled arrangement or in nearly real time.

Synchronous replication is the process of replicating data in real time from the primary storage system to a remote facility.

19
Q

Sharon has been directed to put together a disaster recovery plan based on directives from her company’s executive management team. The company’s core business is operating an e-commerce website selling winter apparel with 85 percent of its revenue received during the holiday season. If there was a prolonged outage, it would put the company’s ability to continue as a financially viable operation in peril. Sharon has been instructed to create a plan that will restore operations in the shortest amount of time possible. What DR model should she implement?

A.  Hot site
B.  Active/active
C.  Warm site
D.  Active/passive
E.  Cold site
F.  Rollover
A

Hot site

The hot site model is the most viable option given the requirements. A hot site is a fully functional backup site that can assume operations immediately should the primary location fail or go offline.

20
Q

Which disaster recovery metrics are used to create a measurable SLA that outlines to you when you can expect your system to be back online and how much data loss you sustained after an outage? (Choose all that apply.)

A.  RSO
B.  RTO
C.  RPO
D.  DR
E.  VxRestore
A

RTO, RPO

The restore point and restore time objectives are the measurements for the amount of data lost and the time needed to get back online after an outage.

21
Q

These cloud facilities provide the ability to connect locally for fast, low-latency connection to the DR locations. They can also store, or cache, data at theses locations for very fast responses to local user requests.

A. Region
B. Edge location
C. Availability zone
D. Replication

A

Edge location

Edge facilities are not complete cloud data centers. They are cloud connection points located in major cities and offer the benefits outlined in the question.

Chapter 6 (page 194)

22
Q

Computer operating systems have mechanism that grant rights to users for access to system objects like storage volume directories and files, administrator rights, and so on. What should you monitor to make sure that old or unused entries are deleted?

A. Stale cache
B. Access control
C. MFA
D. Dashboard

A

Access Control

Access control systems are used to grant users object access in an operating system. For ongoing maintenance and best security practices, it is important to delete old and unused access control policies.

23
Q

James has been directed by his employer’s finance department that they cannot afford to lose any more than 30 minutes of data in the case of a database failure or other catastrophic event. James has updated his corporate business continuity plan and has had his cloud provider update its SLA. What was the metric that was changed?

A. RSO
B. RPO
C. RTO
D. DBO

A

RPO

The restore point objective is the point in time that data can be recovered; James had to update the RPO metric.

24
Q

To meet regulatory requirements, Jill must store customer transaction records for seven years. The data will most likely never be accessed after the second year and can be stored offline if possible to reduce storage costs. What type of storage operation can Jill implement to achieve her goal?

A. File transfer
B. Archive
C. Replication
D. Data store

A

Archive

Moving inactive data or data that is no longer being used to a separate storage facility for long-term storage is referred to as archiving. It can be more cost effective to store archived data in less expensive storage systems and still allow the cloud consumer access to that data for backup and retrieval as needed.

25
Q

Sharon is a network engineer for your firm and is investigating the WAN connection into the hot site. In the event of operation being moved to the backup location, she wants to make sure that the load capacity is available. What should she be most concerned about? (Choose two.)

A.  Traffic normalization
B.  Peak capacity
C.  QOS
D.  SLA
E.  Packet loss and jitter
F.  Bandwidth starvation
A

Peak capacity
Bandwidth starvation

The backup site’s network connection must be engineered to accept the expected traffic load and prevent bandwidth starvation.

26
Q

Cloud dashboards allow for monitoring and sometimes configuring maintenance operations with the cloud provider. If you have regularly scheduled backups for your cloud storage volumes, you can configure the cloud provider to perform specific operations for you using what backend systems?

A. Replication
B. Automation
C. Synchronous
D. Block chain based

A

Automation

Automation systems are backend processes for frontend systems such as dashboards or catalogs.

Chapter 6 (page 197)

27
Q

What service provides permit and deny policies that require regular review to delete unused entries?

A. DNS
B. DHCP
C. Firewalls
D. Active Directory

A

Firewalls

Firewalls contain a list of policies, or rules, that either permit or deny traffic. Over time as the environment changes, it is best practice to review the firewall rules and remove or modify any rules that are obsolete or unused.

28
Q

Christina has been pinging a new web server by its URL and getting strange and seemingly unexplainable responses from unrecognized systems. She recalls that the new web farm is on a reclaimed subnet that was no longer in use in their cloud server fleet. What would you recommend she investigate to resolve the issue?

A. DHCP
B. Orphaned services
C. Stale network access control lists
D. DNS

A

DNS

Stale or out-of-date domain name entries may point to servers that are no longer in use. Also, certain domain names may have never been removed from DNS, causing replies from unexpected devices.

29
Q

During a disaster recovery switchover, what network services may need to be modified as part of a multisite failover to the backup site? (Choose all that apply.)

A.  RADIUS
B.  TACACS
C.  DHCP
D.  FTP
E.  DNS
F.  Active Directory
G.  None of the above
H.  All of the above
A

All of the above

It is important to review all of your network serviced to address any changes required when implementing a disaster recovery plan.

Network disaster recovery services that need to be addressed are Domain Name Services (DNS), Dynamic Host Configuration Protocol (DHCP), File Transfer Protocol (FTP), Active Directory, Remote Authentication Dial-In User Service (RADIUS), and Terminal Access Controller Access-Control System (TACACS). These services are well suited for a multisite deployment that offers failover in case of an outage.

30
Q

Mark has been reviewing disaster recovery planning, and after receiving directions from his company’s board of directors, it has been determined that they can only withstand a maximum of 36 hours of downtime. Mark is updating his DR plan with the new metric. What part of the plan should be modify?

A. RSO
B. RPO
C. RTO
D. DBO

A

RTO

The recovery time objective (RTO) is the amount of time a system can be offline during a disaster; it is the amount of time it takes to get a service online and available after a failure.

31
Q

Jack is preparing to update his company’s business continuity with details on its DR backup site. His plan is to have a facility ready with floor space, power, and cooling that has facilities for him to load in his server racks to restore service. What type of DR implementation is Jack deploying?

A.  Hot site
B.  Active/active
C.  Warm site
D.  Active/passive
E.  Cold site
F.  Rollover
A

Cold site

A cold site is a backup data center provisioned to take over operations in the event of a primary data center failure, but the servers and infrastructure are not deployed or operational until needed.

32
Q

Will is running his backup DR site in a DNS load balancing rotation for testing. He needs to ensure that the database in the DR facility is updated in real time and current with the production replica in the primary data center. What type of updates should he define in his primary data center servers prior to enabling DNS load balancing?

A.  Synchronous replication
B.  Asynchronous replication
C.  Volume sync
D.  Mirroring
E.  RAID 5
A

Synchronous replication

Synchronous replication offerings write data to both the primary storage system and the replica simultaneously to ensure that the remote dat is current with local replicas.

33
Q

What DR location can be used to cache data close to your customer and ease access to your fleet of web servers?

A.  Hot
B.  Warm
C.  Cold
D.  Edge
E.  Zone
F.  Region
A

Edge

Cloud edge locations are often used for proximity services at remote locations that provide data caching locally and offloads the need for calls to the web server fleet.

34
Q

Jerry is doing test cutover to his hot site as part of his company’s ongoing disaster recovery preparedness. He notices on his WAN monitoring dashboard that there are peaks of traffic flow from the primary to his hot site. What is he seeing take place?

A. Synchronous replication
B. Asynchronous replication
C. File transfer
D. Continuity updates

A

File transfer

File transfer occur in the background from the primary data center to a backup site.
Synchronous and asynchronous replications are ongoing file synchronization processes.

35
Q

Tom has been performing an ongoing inventory of his public cloud assets and has found a number of storage volumes, CPU allocations, VMs, and firewall instances that are not connected to any project and are not being used. What services is Tom collecting data on?

A. DNS
B. Stale services
C. Orphaned resources
D. Dashboard services

A

Orphaned resources

Orphaned resources are cloud-based services that are left over when a service terminates and they are no longer needed or used.

36
Q

Hank is preparing a disaster recovery test drill in advance of the upcoming hurricane season along the Gulf of Mexico. His plan is to create a DR location in the Midwest and have a database server running at that location with a synchronously refreshed data replica. His DR plan call for activating all other services in the event of a hurricane causing an outage at his primary data center. What model is Hank going to deploy to meet his requirements?

A. Hot site
B. Warm site
C. Cold site
D. Active/passive

A

Warm site

A warm site approach to recovering from a primary data center outage is when the remote backup of the site is offline except for critical data storage, which is usually the database. The warm site will host an operational database server that is in sync with the database server at the primary data center and is sometimes referred to as the candlelight design.

37
Q

Carl has been investigating stale records in his database that were added by other applications but never deleted or timed out after they were no longer in use. This mappings application is now causing issues with the server addressing and troubleshooting. What system is he looking at?

A. SNMP
B. DHCP
C. DNS
D. FTP

A

DNS

DNS records can be modified by external operations and can map domain names to IP addresses. There you will find occurrences of DNS entries not being deleted and becoming stale over time.

38
Q

Jennifer, a cloud administrator, is provisioning five VMs, each with minimum or 8GB of RAM and a varying load throughout the day. The hypervisor has only 32GB of RAM. Which of the following features should the administrator use?

A. Business continuity
B. Asynchronous replication
C. Process scheduling
D. Synchronous replication

A

Process scheduling

The process scheduling is the activity of the process manager that handles the removal of the running process and the selection of another process on the basis of a particular strategy. It is an essential part of a Multiprogramming operating systems.

Business continuity is defines set of planning and preparatory activities that are used during a serious incident or disaster to ensure that an organization’s critical business functions will continue to operate or will be recovered to an operational state within a reasonably short period.

Asynchronous replication works off a store-and-forward model and is a cost-effective protection and backup solution. With asynchronous replication, the data is first written to the primary storage system in the primary storage facility or cloud location.

Synchronous replication is the process of replication data in real time from the primary storage system to a remote facility. It allows you to store current data at a remote location from the primary data center that can be brought online with a short recovery time and limited loss of data.