IS3340 CHAPTER 8 Flashcards
A defined collection of copies of files created in case the primary copies of the files are damaged or destroyed is called ___?
BACKUP
A restore that includes the operating system and all configuration settings is called ___?
BARE METAL RECOVERY
An alternate security control that fulfills an original goal without implementing the primary control is called ___?
COMPENSATING CONTROLS
A plan that ensures the infrastructure is operational and ready to support primary business functions is called ___?
DISASTER RECOVERY PLAN (DRP)
A product that supports creating and running virtual machines in Windows Server 2008 is called ___?
HYPER-V
A graphical user interface framework that provides a centralized method to manage software components on Windows computers is called ___?
MICROSOFT MANAGEMENT CONSOLE (MMC)
The copy of any piece of information that you use most frequently is called ___?
PRIMARY COPY
The amount of time it should take to recover a resource and bring it back to normal operation is called ___?
RECOVERY TIME OBJECTIVE (RTO)
A collection of disks organized in a way that protects data by duplicating it or wiring extra information to reconstruct any damaged data is called ___?
REDUNDANT ARRAY OF INDEPENDENT DISKS (RAID)
The process of copying secondary copies of files back to their primary location is called ___?
RESTORE OPERATION
A copy of information created to assist in the recovery of the information in the event the primary copy is damaged or destroyed is called a ____?
SECONDARY COPY
A software implementation of a physical computer is called a ___?
VIRTUAL MACHINE (VM)
The ability to run two or more virtual machines simultaneously on a single physical computer is called ___?
VIRTUALIZATION
A Windows service that assists utilities and applications in creating snapshots of a running Windows system is called ___?
VOLUME SHADOW COPY SERVICE (VSS)
- A valid backup is all an organization needs to recover from a disaster.
TRUE OR FALSE
FALSE