Disaster Recovery and Incident Response (Ch. 12) Flashcards

1
Q

A physical site that can be used if the main site is inaccessible (destroyed) but that lacks all of the resources necessary to enable an organization to use it immediately.

A

cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of backup that includes only new files or files that have changed since the last full backup, but does not clear the archive bit

A

differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The act of recovering data following a disaster in which it has been destroyed.

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A plan outlining the procedure by which data is recovered after a disaster.

A

disaster-recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of reconstructing a system or switching over to other systems when a failure is detected.

A

failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A flagged event that isn’t really a notable incident and has been falsely triggered.

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of security, the act of looking at all the data at your disposal to try to figure out who gained unauthorized access and the extent of that access.

A

forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A backup that copies all data to the archive medium.

A

full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A location that can provide operations within hours of a failure of the main site.

A

hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of backup that includes only new files or files that have changed since the last full backup and then clears the archive bit upon completion.

A

incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The act of entering a system without authorization to do so.

A

intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any set of tools that can identify an attack using defined rules or logic.

A

intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Any set of tools that identify and then actively respond to attacks based on defined rules, and can be network or host based.

A

intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Penetration and other testing that involves trying to break into the network.

A

intrusive tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration/vulnerability testing that takes a passive approach rather than actually trying to break into the network.

A

nonintrusive tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Storing data off the premises, usually in a secure location.

A

offsite storage

17
Q

Storing backup data at the same site as the servers on which the original data resides.

A

onsite storage

18
Q

Image of a virtual machine at a moment in time.

A

snapshot

19
Q

A snapshot of what exists.

A

system image

20
Q

An exercise that involves individuals sitting around a table with a facilitator discussing situations that could arise and how best to respond to them.

A

tabletop exercise

21
Q

Identifying specific vulnerabilities in your network.

A

vulnerability scanning

22
Q

A site that provides some capabilities in the event of a disaster. The organization will need to install, configure, and reestablish operations on systems that might already exist at the backup site.

A

warm site

23
Q

The copy of the data currently in use on a network.

A

working copy backup