Domain 8 Flashcards
Between which two areas should a security policy seek to achieve a balance?
a) Security and Confidentiality
b) Integrity and Access
c) Access and Security
d) Confidentiality, Integrity and Availability
Access and Security
There are many types of testing methods involved while exercising and maintaining a Business Continuity Plan. Which of the following types of testing is also known as consistency testing?
a) Validity testing
b) Simulation testing
c) Checklist testing
d) Structured walk-through testing
Checklist testing
Which of the following topics is NOT part of a well defined Business Continuity Plan (BCP) ?
a) Post-disaster recovery
b) Fiscal budget forecasting
c) Back-up operations
d) Emergency response
Fiscal budget forecasting
The distinction between a business continuity plan (BCP) and a disaster recovery plan (DRP) are best described as what?
a) The business continuity plan deals with the restoration or continued operations of the business processes, whereas the disaster recovery plan deals with the efforts to recover the physical environment from a natural disaster.
b) The business continuity plan deals with the restoration or continued operations of the business processes, whereas the disaster recovery plan deals with the restoration of the critical information systems that support the business processes.
c) The business continuity plan deals with the effort to spread information system upgrades and purchases over time so as to mitigate the risk of security incidents stemming from overworked staff and/or unsecured computers. The disaster recovery plan deals with the restoration of the critical information systems that support the business processes.
d) The distinction is minor, but can be characterized as the difference between what is done just before a disaster and what is done just after a disaster.
The business continuity plan deals with the restoration or continued operations of the business processes, whereas the disaster recovery plan deals with the restoration of the critical information systems that support the business processes
Which of the following characterizations concerning business continuity plans and disaster recovery plans is correct?
a) A business continuity plan is long term focused, and a disaster recovery plan is short term focused .
b) A business continuity plan is short term focused, and a disaster recovery plan is long term focused.
c) Both business continuity plans and a disaster recovery plans are long term focused.
d) Both business continuity plans and a disaster recovery plans are short term focused.
A business continuity plan is long term focused, and a disaster recovery plan is short term focused
What is the most common source of security “disasters”?
a) Disgruntled employees
b) Contractors and vendors
c) Hackers/crackers
d) Errors and omissions
Errors and omissions
The proper flow in the development of a business continuity plan (BCP) or disaster recovery plan (DRP) is characterized by which of the following set of steps?
a) Business impact analysis, risk analysis, build the plan, test and validate, modify and update the plan, and approve and implement the plan.
b) Risk analysis, business impact analysis, build the plan, test and validate, modify and update the plan, and approve and implement the plan
c) Risk analysis, business impact analysis, build the plan, test and validate, and approve and implement the plan
d) Business impact analysis, build the plan, test and validate, modify and update the plan, and approve and implement the plan
Risk analysis, business impact analysis, build the plan, test and validate, modify and update the plan, and approve and implement the plan
A key part of developing a business continuity plan (BCP) is to get “C-level” support. What is “C-level” support?
a) The support given by chief level positions in the company, such as CFO, CEO and CIO.
b) The support given by people “in the middle”, or “C-level” to the organization, such as experienced system and security administrators.
c) The support given by the middle tier of management, or C-level management, which is the level at which most of the important day-to-day operations are made.
d) The support given by those whose job is to address the business continuity at an information systems level.
The support given by chief level positions in the company, such as CFO, CEO and CIO
Which of the following is NOT a business continuity plan deliverable?
a) Procedure to keep the plan up-to-date
b) Plan for testing
c) Plan for training
d) Tape backup storage plan
Tape backup storage plan
There are many types of testing methods involved while exercising and maintaining a Business Continuity Plan. Which of the following types of testing is also known as validity testing?
a) Consistency testing
b) Simulation testing
c) Checklist testing
d) Structured walk-through testing
Structured walk-through testing
In the business impact analysis (BIA) , answers to key questions such as “Would the disaster impact the level of service?” should come from or be concurred by whom?
a) The data owner
b) The customer
c) Executive management
d) The system administration staff
Executive management
With respect to the business impact analysis (BIA) , what is NOT true of the vulnerability assessment?
a) It provides sufficient detail to and scope to complete the BIA.
b) It is smaller than a full risk assessment.
c) It identifies crucial business functions.
d) It uses results as input to a recovery strategy.
It provides sufficient detail to and scope to complete the BIA
The primary goal of a business impact analysis (BIA) is to determine what?
a) The minimum set of information system resources needed to operate
b) The maximum allowable downtime for any given system
c) The impact upon the financial and operating resources of the company for the first 24 and 72 hours periods after downtime has occurred
d) The average time any given system can be down before the business is “impacted” in a financial or operational manner
The maximum allowable downtime for any given system
“Mirroring,” a type of time-synchronized backup, is also known as what?
a) A bit-for-bit copy
b) RAID 5
c) An incremental backup
d) Electronic vaulting.
Electronic vaulting
Which of the following types of business continuity plan testing is also known as “validity testing?”
a) Simulation testing
b) Structured walk-through testing
c) Full interpretation
d) Checklist
Structured walk-through testing