Recovery and Incident Response Flashcards

1
Q

A physical site that can be used if the main site is inacessible (destroyed) but that lacks all of the resources necessary to enable an organization to use it immediately.

A

cold site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of backup that is fast, and backup only the data thats been changed since the last full backup or incremental backup.

A

Incremental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of backup that backs up only the data thats been changed since the last full backup.

A

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of backup that copies all data to the archive medium.

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A site that provide some capabilities in the event of a disaster. The company will need to install, configure, and reestablish operations on systems that might already exist.

A

Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The copy of the data currently in use on a network. Are partial or full backups.

A

Working copy backup or shadow copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of pentest where the tester has absolutely no knowledge of the system and is functioning in the same manner as an outside attacker.

A

Black box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of pentest where the tester has significant knowledge of the target system. This simulates an attack from an insider.

A

White box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of pentest that is a midle term. Where the tester has some limited knwoledge of the target system

A

Gray box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process of implementing policies, controls, and procedures to counteract the effect of losses, outages, or failures of critical business process.

A

Business Continuity Planning (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to those processes or systems that must be made operational imediately when an outage occurs.

A

Critical Business Functions (CBFs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Evaluating the process, and risk assessment is concerned with evaluating the risk or likelihood of a loss.

A

BIA - Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A file system that includes a log file of all changes and transactions that have ocurred withing a set period of time (such as the last few hours).Allows unsaved data to be written after recovery and restored it to its pre-crash condition.

A

Journaling - JFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A plan where the primary emphasis is reestablishing services and minimizing losses.

A

disaster-recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A plan that identifies which information is to be stored, how it will be stored, and for what duration it will be stored.

A

Backup plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Newer backup type, provides continuous online backup by using optical or tape jukeboxes

A

HSM - Hierarchical storage management

17
Q

Backup method based on a year backup, a monthly backup and a weekly backup.

A

Grandfather, Father, Son method

18
Q

Backup method where everything is created on a computer is stored forever.

A

Full Archival Method.

19
Q

Term used to perform a reversion from a change that had negative consequences

A

Backout

20
Q

A site location that can provide operations back withing hours of a failure. Has everything in place to reestablish services in a short time.

A

Hot site.

21
Q

Refers to the process of identifying what has ocurred on a system by examining the data trail. Involves an analysis of evidence found in computers and on digital storage media.

A

Forensics

22
Q

Process of identifying, investigating, repairing, documentating, and adjusting procedures to prevent another incident.

A

Incident response.