CISA Refresher 3 Flashcards

1
Q

A clustering is

A

a type of software that is installed on every server in which the application runs and includes management software that permits control of and tuning the cluster behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RAID provides

A

performance improvements and fault tolerent capabilities via hardware and software solutions, breaking up data and writing data to a series of multiple disks to simultaneously improve performanance and save large files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

diverse routing

A

the method of routing traffic through split cable facilities or duplicate cable facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

diverse routing, disadvantages

A

It is time consuming and costly. These cable facilities are usually located in the ground or basement. Ground based facilities are at great risk due to aging infrastructures of cities. And usually it share rooms with mechanical and electrical systems that can impse great risk due to human error and disastrous events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Emergency action team

A

One of their primary functions is the orderly evacuation of personnel and securing human life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Emergency management team

A

Their function entails arranging finances of recovery, handling legal matters evolving from the disaster, and handling public relation and media inquires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Offsite storage team

A

Resoponsible for obtaining, packaging and shipping media and record to the recovery facilities, as well as establishing and overseeing an offsite storage schedule for information created during operations at the recovery site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transportation team

A

serves as facilities team to locate recovery site, if one has not been predetermined and is resposible for coordinating the raansport of company employees to a distant recovery site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Supplies team

A

Supports the efforts of the user hardware team by contacting vendors and coordinating logistics for an ongoing supplyes of necessary offices and computer supplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Salvage team

A

Manages the relocation project. This team also makes a more detailed assessment of the damage to the facilities and equipment than was preformed initially, provides information necessary for filing insurance claims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Relocation team

A

Coordinates the process of moving from the hot site to a new location or to the restored original location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Coordination team

A

Resoponsible for coordinating the recovery efforts across various ofices located at different geographical locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Crucial element of DRP

A

is the availability of adequate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most important features of the tape drives is its data interface

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disk based backup system

A

VTL, Host based replication, Disk array based replication, snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VTL ( virtual tape libraries

A

The systems consist of dis storage and software that control backup and recovery data sets.

17
Q

Host based replications

A

This replication is done at the host (server) level by a special software running on this server and on the target server. Could be done in real time.

18
Q

Disk array based replication

A

Same as host based rplications, however the rplication is performed at the disk array level, completely hidden from servers and applications.

19
Q

Snapshots

A

This technology is very flexinble, allowing making different type of momentary copies of volumes or file systems. Thid technology is especially efficient and effective while used in combination with backup and recovery software

20
Q

Differential backup

A

It requires less time to restore than incremental baackups, but it is slower and require more media capacity than incremental backups because data that are backed up are cumulative.

21
Q

Reconnaissance

A

should be performed first to establish the footperint of the target organization and search for any information leakage that would inadvertently disclose technical details about the organizations network.

22
Q

Enumeration

A

involves mapping the networok services, protocols and devices and would normaly occur after the initial reconnaissance

23
Q

Vulnerability scanning

A

would occur in the later stage of the assessment

24
Q

Disadvantage of IDS

A

is its inherent inability to scan for vulnerabilities atthe application level. It cannotg break encrypted date packtes to identify the source of the incoming traffic.

25
Q

In order to provide the greatest security and efficiency and IDS should be placed behind the firewall so that it will detect only those attacks / intruders that enter the firewall

A

TRUE

26
Q

System administrator account

A

It is not possible to lock out the system administrator account after several failed logon attempts, because it would be impossible to unlock it. Therefore it is subject to online brute force attacks.

27
Q

A Digital signature includes an encrypted has total of the size of the message as it was transmitted by its originator. This has would no longer be accurate if the messagewas altered subsequently, indicating that the alteration has occured

A

TRUE