Quiz 14 Flashcards

1
Q

A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:
recovery point objective
recovery time objective
service level agreement
service point agreement

A

service level agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is caused by a short-duration burst of energy by the source?
Faraday interference
electromagnetic pulse
electromagnetic interference
electrostatic discharge

A

electromagnetic interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?
chain of custody
chain of property
chain of use
chain of value

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional load?
symmetric server
symmetric network
asymmetric network
asymmetric server

A

symmetric server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
disaster planning
enterprise disaster planning
business management planning
business continuity planning

A

business continuity planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An incident response plan is a set of written instructions for reacting to a security incident.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of assessment can determine if a system contains PII, whether a privacy impact assessment is required, and if any other privacy requirements apply to the IT system?
privacy threshold
privacy impact
privacy identification
privacy availability

A

privacy threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or a criminal is an example of:
risk management
penetration testing
computer forensics
vulnerability testing

A

computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?
baseline
mirror image
thin image
logical image

A

mirror image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?
Sector slack
RAM slack
Edge slack
Drive file slack

A

Drive file slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:
hot site
spare site
cold site
warm site

A

warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When the remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?
Disk slack
Edge slack
ROM slack
RAM slack

A

RAM slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What RAID type is based on striping, uses multiple drives, and is not fault tolerant if one of the drives fails?
RAID 2
RAID 0
RAID 5
RAID 1

A

RAID 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a system of hard drives based on redundancy and used for increased reliability and performance?
ESD
MTBF
RAID
RPO

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a location that provides office space, but the customer must provide and install all the equipment needed to continue operations?
spare site
hot site
cold site
warm site

A

cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The goal of redundancy is to reduce what variable?
mean time to recovery
average time between failures
median time to recovery
median time between failures

A

mean time to recovery

17
Q

What specific way can disaster recovery plans be tested?
tabletop exercises
restoration simulation
alternative exercises
alternative processing

A

tabletop exercises

18
Q

Resumption planning is used for the recovery of critical business functions separate from IT, such as resuming a critical manufacturing process.
True
False

A

True

19
Q

Multiple sectors on a disk, when combined, are referred to as a:
track
cluster
slice
platter

A

cluster

20
Q

Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?
single point of failure
recovery point
recovery site
cascade point of failure

A

single point of failure

21
Q

A legal stop order is a notification sent from the legal team to employees instructing them not to delete electronically stored information or paper documents that may be relevant to the incident.
True
False

A

False

22
Q

A privacy impact assessment is used to identify and mitigate privacy risks.
True
False

A

True

23
Q

Forensics is the application of science to questions that are of interest to the technology professions.
True
False

A

False

24
Q

Which of the following is the sudden flow of electric current between two objects?
electrostatic discharge
electromagnetic interference
electromagnetic pulse
Faraday interference

A

electrostatic discharge

25
Q

When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?
business risk analysis
business productivity analysis
business alert assessment
business impact analysis

A

business impact analysis

26
Q

What type of planning do many enterprises participate in that addresses a future event or circumstance that might possibly occur but cannot be predicted with any certainty?
IT disaster planning
IT contingency planning
disaster recovery scenario
contingency system evaluation

A

IT contingency planning

27
Q

What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?
RAID 5
RAID 1
RAID 2
RAID 0

A

RAID 5

28
Q

A snapshot of the data is essentially a series of “reference markers” of the data at a specific point in time.
True
False

A

True

29
Q

An enterprise contingency plan is copying information to a different medium and storing it at an off-site location so that it can be used in the event of a disaster.
True
False

A

False

30
Q

Select below the type of cluster where standby server exists only to take over for another server in the event of its failure.
symmetric server
asymmetric server
asymmetric network
symmetric network

A

asymmetric server

31
Q

What type of element addresses the recovery of critical information technology (IT) assets, including systems, applications, databases, storage and network assets?
crisis management
business recovery
disaster recovery
enterprise recovery

A

disaster recovery

32
Q

What value refers to the average amount of time until a component fails, cannot be repaired, and must be replaced?
mean time between failures
median time between failures
mean time to recovery
average time between failures

A

mean time between failures

33
Q

A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
system baseline
system standard
system view
system image

A

system image

34
Q

A disaster recovery plan is developed for restoring the IT functions and services to their former state.
True
False

A

True

35
Q

A business impact analysis may include succession planning or determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.
True
False

A

False

36
Q

A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
mantrap
Newton cage
Faraday cage
bollard cage

A

Faraday cage

37
Q

What kind of data can be lost when a computer is turned off?
non-volatile
static
persistent
volatile

A

volatile

38
Q

How can an administrator keep devices powered when power is interrupted?
redundant power supply
uninterruptible system supply
uninterruptible power supply
replica power supply

A

uninterruptible power supply

39
Q

Which of the following is usually addressed in a disaster recovery plan? (Choose all that apply.)
Recovery Team
Purpose and Scope
Business Procedures
Restoration Procedures

A

Recovery Team
Purpose and Scope
Restoration Procedures