Implementing Business Continuity & Disaster Recovery Flashcards

1
Q

A security engineer is trying to identify appropriate groups to help determine which groups should be part of incident response. Which guide could they use?

A

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-61, “Computer Security Incident Handling Guide,” identifies the groups that are necessary when responding to an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is COBIT?

A

The Control Objectives for Information and Related Technologies (COBIT) is a framework created and maintained by Information Systems Audit and Control Association (ISACA). COBIT frames IT risk from a business leadership viewpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A major retail company needs to set up alternate sites so that despite any unforeseen circumstances, the business has as little impact on its operation as possible. Which of the following would be the best setup?

A

A hot site is by far the most expensive and complicated option to implement but results in close to real-time activation with little to no service disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a mobile site?

A

A mobile site can be described as a data center in a box and is a technique employed by the military.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A mid-size company is considering a backup alternative solution for their small data center operations but is running a skeleton crew. They are starting to look at cloud solutions. Which solution should be their focus?

A

DRaaS

Disaster Recovery as a Service (DRaaS) would be a suitable choice for a company with a small data center and limited personnel. DRaaS offers a turnkey solution where the cloud provider manages disaster recovery process, reducing the need for in-house resources. This would free up their limited staff to focus on other tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SaaS?

A

Software as a Service (SaaS) represents the lowest amount of responsibility for the customer as the facilities, utilities, physical security, platform, and applications are the provider’s responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Paas?

A

Platform as a Service (PaaS) provides a selection of operating systems that the customer can load and configure. The underlying infrastructure, facilities, utilities, and physical security are the responsibility of the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is IaaS?

A

Infrastructure as a Service (IaaS) provides hardware hosted at a provider facility using the provider’s physical security controls and utilities, such as power. The underlying infrastructure, facilities, utilities and physical security are the responsibility of the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security architect is looking for examples of standards and regulations with descriptions of Business Continuity and Disaster Recovery (BCDR) capabilities. What are some examples?

A

SOX
GLBA
FFIEC

The Sarbanes-Oxley (SOX) Act regarding fraudulent accounting is one example of standards and regulations with descriptions of Business Continuity and Disaster Recovery (BCDR) capabilities.

The Gramm-Leach-Bliley (GLBA) Act regarding personal financial information is another example of standards and regulations with descriptions of Business Continuity and Disaster Recovery (BCDR) capabilities.

The Federal Financial Institutions Examination Council (FFIEC) regarding financial institutions is another example of standards and regulations with descriptions of Business Continuity and Disaster Recovery (BCDR) capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security practitioner is conducting a privacy impact assessment (PIA) as part of a business continuity plan. What should the practitioner assess?

A

Sensitivity
Collection methods
Sharing methods

A large part of this assessment includes analyzing the sensitivity level of privacy data. A system containing full names will need to be handled differently from one containing social security numbers or other similar government-supplied identifiers.

Another large part of this assessment includes collection methods, including how the company uses and maintains data. This helps to ensure that these processes continue in the event of a disaster.

A privacy impact assessment should also document whether the company shares the data and the parties included in the sharing arrangement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A data center manager is planning for disaster recovery. What key element should the manager first gain that is critical to success?

A

Senior leadership’s participation and sponsorship of Business Continuity and Disaster Recovery (BCDR) activities are essential for successful preparedness.

Before taking staff resources away from business development projects to work on BCDR planning, first requires senior leadership support. Some organizations may have significant plans in place, but the organizations may not have properly tested them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A military unit is going into a foreign country and setting up a small data center for their operations but wants to have an alternate option that is flexible and versatile. Which of the following options would best suit their needs?

A

A mobile site can be described as a data center in a box and is a technique employed by the military.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security analyst is leading a disaster recovery simulation and wants to determine whether all parties involved in the response know what to do and how to work together to complete the exercise. What simulation should they perform?

A

Tabletop Exercise

The tabletop exercise will identify a specific objective or goal and then use it to determine whether all parties involved in the response know what to do and how to work together to complete the exercise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst is setting up documents for the outputs of the test or incident, along with recommendations based on the outputs and findings. Which standard should the analyst reference?

A

NIST 800-84

NIST SP 800-84, the “Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities,” includes an after-action report template that helps with documentation and findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security consultant works for a U.S.-based company and sets up a data recovery site in Germany. The security consultant is beginning the first verification of a data center failover scenario. What are some common issues the consultant might expect to encounter?

A

Recovery failure
Data loss
Software not working

Failure to recover can be a common issue for various reasons. For example, the entire data center had syncing issues, or the Storage Area Network could have issues syncing, or disks were corrupt at the recovery site.

Data loss is another common issue for similar reasons. An administrator should monitor the health status of disaster recovery (DR) devices to help avoid issues.

Software may not work when brought up from recovery for various reasons. For example, server configurations may not have deployed exactly the same, or the configurations are the same but need changes made for the DR environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A data center lead is preparing an organization for disaster recovery by performing an actual test to ensure systems can failover but wants to minimize impact to production systems. Which method should the data center lead use?

A

In a parallel test, the organization isolates the DR site from the primary site, activating it as though the company is using the DR site. This is the best option to minimize impact.

17
Q

A security manager is planning for the needs of an immediate frantic and pressing emergency. Which plan should the security manager focus on developing?

A

Disaster Recovery Plans (DRPs) focus on when events are their most frantic and pressing. DRPs focus on the tasks required to bring critical systems back online.

18
Q

A security architect is creating a business continuity plan (BCP) and is currently assessing how much data the company can lose without causing harm to business operations. What objective is the security architect defining in the BCP?

A

Recovery Point Objective (RPO) defines the amount of data that the company can lose without irreparable harm to the operation of the business. The system architect must define this metric through careful collaboration with the organization, as the requirements may be specified within laws and regulations.

19
Q

A security engineer is performing a business impact assessment (BIA) for an organization. Where should the security engineer begin?

A

Inventory

As with critical security controls, the first step in the development of the BIA is to identify the information systems and the various elements that are part of it.