Module 14: Cybersecurity Resilience Q Flashcards
In an interview, you are asked to explain the major objective of having resilience in an organization. How should you respond?
The major objective of resilience in an organization is to provide uninterrupted services
The major objective of resilience is to provide uninterrupted services to end users, even at a time of disaster
Which of the following documents provide alternative modes of operation for interrupted business activities?
Business continuity plan
A business continuity plan (BCP) is a strategic document that provides alternative modes of operation for business activities that, if interrupted, could result in a significant loss to the enterprise
Which of the following is NOT a part of business continuity planning?
Contingency actions
Contingency actions are tactical solutions that address a core business resource or process. They are not a part of a business continuity plan (BCP)
Dave is preparing a COOP for his company. In it, he included how and where employees and resources will be relocated in case of a natural disaster, how data will be recovered in case a terrorist attack shuts down public networks, and how the company’s critical services and processes will be affected by an IT system failure. Did Dave compile the COOP correctly?
No. Dave’s COOP plan should not include how critical services and processes will be affected by an IT system failure
Dave’s COOP plan should not include how the company’s critical services and processes will be affected by an IT system failure. This information should be included in a BIA
You work at the headquarters of an enterprise known for unethical practices. The company has many remote sites, but most functions are performed at one location. Your enterprise recently hired a third-party vendor known for high-accuracy business impact analyses. The BIA performed by the vendor has since proved wrong, as an incident impacted the business significantly more than forecast. You are assigned to conduct a study on the BIA’s misconception and submit a report.
What should you investigate as the possible reason for the BIA’s inaccuracy?
The vendor overlooked the organization’s remote sites
As the remote sites also contribute to the organization’s functionalities, the vendor likely overlooked them, analyzing only the main site’s functions. This likely led to the inaccurate analysis
After a disaster disrupted your organization’s functioning, you were assigned to determine the sequence for reinstating systems. Which of the following documents should you refer to when deciding the restoration order?
Data recovery plan
A data recovery plan (DRP) details the process for restoring IT resources following an event that causes a significant service disruption
You are a security admin for an enterprise, and you were asked to ensure high availability of data using redundancy. Which of the following action should you perform?
Store the same data in different devices across different locations
Storing the same data on different devices across different locations provides high availability of data through redundancy
One of the important systems in your organization was accidentally exposed to malware. Which of the following features should you use to manage the risk of malware?
Revert to a known state
The revert to known state feature can manage the risk of malware by reverting the system to a previously known state
What do servers connected in a cluster use to communicate with each other?
Private cluster connection
Servers in a cluster communicate through a private cluster connection to ensure a smooth user experience
You are asked to construct a server cluster to provide resilience to the webserver hosted by your enterprise. Which of the following clustering systems should you implement to ensure the standby server only works when the other server fails?
Asymmetric
In asymmetric clustering systems, the standby server only works when the other server fails
Which of the following best describes a Fake RAID?
Software RAID assisted by BIOS
A Fake RAID is BIOS-assisted software RAID. It is usually proprietary and nonstandard
Which of the following RAID configurations have no fault tolerance?
RAID level 0
RAID level 0 does not have fault tolerance capacity. If one disk fails, the whole data are lost
You are working as a cybersecurity expert in an enterprise. While examining the newly established enterprise network, you found that when a request to write data to the drive is made, the controller sends that request to each drive. When a read action is required, the data is read twice, once from each drive. Which type of RAID is used in the newly established network?
RAID level 1
RAID level 1 uses disk mirroring, which stores the same data on different drives, for fault tolerance
Which of the following allows high-speed storage and transmission of large volumes of data?
SAN
The storage area network (SAN) is a dedicated network storage facility that provides data storage access over a high-speed network
You are assigned to install multiple physical paths between devices and the SAN so that an interruption in one path will not affect communication. Which of the following techniques should you implement to manage the risk of interruption?
Multipath
Multipath is a technique for creating more than one physical path between devices and a SAN. If one path is interrupted, multipath will simply redirect the broken connection to another path