Quiz 14 Flashcards
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:
recovery point objective
recovery time objective
service level agreement
service point agreement
service level agreement
Which of the following is caused by a short-duration burst of energy by the source?
Faraday interference
electromagnetic pulse
electromagnetic interference
electrostatic discharge
electromagnetic interference
What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?
chain of custody
chain of property
chain of use
chain of value
chain of custody
In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional load?
symmetric server
symmetric network
asymmetric network
asymmetric server
symmetric server
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
disaster planning
enterprise disaster planning
business management planning
business continuity planning
business continuity planning
An incident response plan is a set of written instructions for reacting to a security incident.
True
False
True
What type of assessment can determine if a system contains PII, whether a privacy impact assessment is required, and if any other privacy requirements apply to the IT system?
privacy threshold
privacy impact
privacy identification
privacy availability
privacy threshold
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or a criminal is an example of:
risk management
penetration testing
computer forensics
vulnerability testing
computer forensics
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?
baseline
mirror image
thin image
logical image
mirror image
What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?
Sector slack
RAM slack
Edge slack
Drive file slack
Drive file slack
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:
hot site
spare site
cold site
warm site
warm site
When the remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?
Disk slack
Edge slack
ROM slack
RAM slack
RAM slack
What RAID type is based on striping, uses multiple drives, and is not fault tolerant if one of the drives fails?
RAID 2
RAID 0
RAID 5
RAID 1
RAID 0
Which of the following is a system of hard drives based on redundancy and used for increased reliability and performance?
ESD
MTBF
RAID
RPO
RAID
Which of the following is a location that provides office space, but the customer must provide and install all the equipment needed to continue operations?
spare site
hot site
cold site
warm site
cold site
The goal of redundancy is to reduce what variable?
mean time to recovery
average time between failures
median time to recovery
median time between failures
mean time to recovery
What specific way can disaster recovery plans be tested?
tabletop exercises
restoration simulation
alternative exercises
alternative processing
tabletop exercises
Resumption planning is used for the recovery of critical business functions separate from IT, such as resuming a critical manufacturing process.
True
False
True
Multiple sectors on a disk, when combined, are referred to as a:
track
cluster
slice
platter
cluster
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?
single point of failure
recovery point
recovery site
cascade point of failure
single point of failure
A legal stop order is a notification sent from the legal team to employees instructing them not to delete electronically stored information or paper documents that may be relevant to the incident.
True
False
False
A privacy impact assessment is used to identify and mitigate privacy risks.
True
False
True
Forensics is the application of science to questions that are of interest to the technology professions.
True
False
False
Which of the following is the sudden flow of electric current between two objects?
electrostatic discharge
electromagnetic interference
electromagnetic pulse
Faraday interference
electrostatic discharge
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?
business risk analysis
business productivity analysis
business alert assessment
business impact analysis
business impact analysis
What type of planning do many enterprises participate in that addresses a future event or circumstance that might possibly occur but cannot be predicted with any certainty?
IT disaster planning
IT contingency planning
disaster recovery scenario
contingency system evaluation
IT contingency planning
What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?
RAID 5
RAID 1
RAID 2
RAID 0
RAID 5
A snapshot of the data is essentially a series of “reference markers” of the data at a specific point in time.
True
False
True
An enterprise contingency plan is copying information to a different medium and storing it at an off-site location so that it can be used in the event of a disaster.
True
False
False
Select below the type of cluster where standby server exists only to take over for another server in the event of its failure.
symmetric server
asymmetric server
asymmetric network
symmetric network
asymmetric server
What type of element addresses the recovery of critical information technology (IT) assets, including systems, applications, databases, storage and network assets?
crisis management
business recovery
disaster recovery
enterprise recovery
disaster recovery
What value refers to the average amount of time until a component fails, cannot be repaired, and must be replaced?
mean time between failures
median time between failures
mean time to recovery
average time between failures
mean time between failures
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
system baseline
system standard
system view
system image
system image
A disaster recovery plan is developed for restoring the IT functions and services to their former state.
True
False
True
A business impact analysis may include succession planning or determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.
True
False
False
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
mantrap
Newton cage
Faraday cage
bollard cage
Faraday cage
What kind of data can be lost when a computer is turned off?
non-volatile
static
persistent
volatile
volatile
How can an administrator keep devices powered when power is interrupted?
redundant power supply
uninterruptible system supply
uninterruptible power supply
replica power supply
uninterruptible power supply
Which of the following is usually addressed in a disaster recovery plan? (Choose all that apply.)
Recovery Team
Purpose and Scope
Business Procedures
Restoration Procedures
Recovery Team
Purpose and Scope
Restoration Procedures