SEC+ Revision Questions Disaster Recovery and Business Continuity Flashcards

1
Q

A team leader assigns Ron, a server administrator, the task of determining the business and financial effects that a failed e-mail server would have if it was down for two hours. What type of analysis must Ron perform?
A. Critical systems and components identification
B. Business impact analysis
C. Security audit
D. Risk assessment

A

B. Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An urban law enforcement agency leases a new space in another part of town complete with a functioning computer network mirroring the current live site. A high-speed network link
constantly synchronizes data between the two sites. What type of site is the new leased location?
A. Frost site
B. Cold site
C. Warm site
D. Hot site

A

D. Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An urban law enforcement agency leases a new space in another part of town complete with a functioning computer network mirroring the current live site. Data backups from the primary site are copied to the new leased location every two days. What type of site is the new leased location?
A. Frost site
B. Cold site
C. Warm site
D. Hot site

A

C. Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Turtle Airlines has hired you to ensure its customer reservation system is always online. The software runs and stores data locally on the Linux operating system. What should you do?
A. Install two Linux servers in a cluster. Cluster the airline software, with its data being written to shared storage.
B. Install a new Linux server. Ensure the airline software runs from the first server. Schedule airline data to replicate to the new Linux server nightly.
C. Configure the Linux server with RAID 5.
D. Configure the Linux server with RAID 1.

A

A. Install two Linux servers in a cluster. Cluster the airline software, with its data being written to shared storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A busy clustered web site regularly experiences congested network traffic. You must improve the web site response time. What should you implement?
A. Ethernet switch
B. Network load balancing
C. Fibre Channel switch
D. Proxy server

A

B. Network load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your primary e-mail server uses three hot-swappable hard disks in a RAID 5 configuration. When one disk fails, you have other disks readily available in the server room that you simply plug in while the server is still running. Which term best describes this scenario?
A. Disk clustering
B. Hardware fault tolerance
C. Disk striping
D. Disk mirroring

A

B. Hardware fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your server backup routine consists of a full backup each Friday night and a nightly backup of all data changed since Friday’s backup. What type of backup schedule is this?
A. Full
B. Full and incremental
C. Full and differential
D. Fully incremental

A

C. Full and differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The chief security officer at a national bank chain will be retiring next year, and an IT security employee must be groomed to fill that position. What term encompasses this procedure?
A. Retirement
B. Job rotation
C. Succession planning
D. Disaster recovery

A

C. Succession planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are a network engineer for a Los Angeles law firm. After the 1989 earthquake, an emphasis on continued business operation after future earthquakes dominated the Los Angeles business community. What type of plan focuses on ensuring that personnel, customers, and IT systems are minimally affected after a disaster?
A. Risk management
B. Fault tolerant
C. Disaster recovery
D. Business continuity

A

D. Business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Windows Server 2012 backups are scheduled as follows: full backups on Saturdays at 3 a.m. and incremental backups weeknights at 9 p.m. Write verification has been enabled. Backup tapes are stored offsite at a third-party location. What should be done to ensure the integrity and confidentially of the backups? (Choose two.)
A. Have a different person than the backup operator analyse each day’s backup logs.
B. Ensure the user performing the backup is a member of the Administrators group.
C. Encrypt the backup media.
D. Use SSL to encrypt the backup media.

A

A. Have a different person than the backup operator analyse each day’s backup logs.
&
C. Encrypt the backup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are an IT network architect. Your firm has been hired to perform a network security audit for Acme Shipping Inc. One of Acme’s warehouses has a server room containing one Windows server and two Linux servers. After interviewing the server administrators, you learn they have no idea what to do if the Linux servers cease to function. What is needed here?
A. Disaster recovery plan
B. Risk analysis
C. Windows servers
D. Server clustering

A

A. Disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which items should be considered when ensuring high availability for an e-commerce web site? (Choose two.)
A. Using TPM to encrypt server hard disks
B. Using redundant Internet links
C. Network load balancing
D. Upgrading the server CMOS to the latest version

A

B. Using redundant Internet links
&
C. Network load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which items should be considered when creating a disaster recovery plan? (Choose three.)
A. Determine which class of IP addresses are in use.
B. Rank risks.
C. Disable unused switch ports.
D. Assign recovery tasks to personnel.
E. Establish an alternate location to continue business operations.

A

B. Rank risks.
&
D. Assign recovery tasks to personnel.
&
E. Establish an alternate location to continue business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As part of your disaster recovery planning, you create a prioritized list of professionals who can be contacted in the event of a flood. Who are they? (Choose three.)
A. Property restoration specialist
B. Document restoration specialist
C. Server backup specialist
D. Server restoration specialist

A

A. Property restoration specialist
&
B. Document restoration specialist
&
D. Server restoration specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should be used to make informed decisions regarding your specific disaster recovery plan?
A. DRP template freely downloaded from a web site
B. ROI analysis
C. TCO analysis
D. Business impact analysis

A

D. Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the disaster recovery plan errors. (Choose two.)
A. Perform a business impact analysis first.
B. Base your DRP on a downloaded template.
C. Data backups are never tested; it costs the company too much money.
D. Keep existing backup solutions in place even though the software is two versions out of date.

A

B. Base your DRP on a downloaded template.
&
C. Data backups are never tested; it costs the company too much money.

17
Q

You are creating a DRP for a small, independent car dealership. There are four employees who each use a desktop computer; there are no servers. All company data is stored on the four computers. A single high-speed DSL link is shared by all users. What are the best DRP solutions? (Choose two.)
A. Store data with an online data storage service.
B. Ensure employees know exactly what to do in the event of a disaster.
C. Purchase faster desktops.
D. Purchase a file server.

A

A. Store data with an online data storage service.
&
B. Ensure employees know exactly what to do in the event of a disaster.

18
Q

Mark is the server specialist for Big Game Hunting Inc. While installing a new server data hard disk, Mark spills his cup of coffee on the old server data hard disk. What should Mark do?
A. Use a blow-dryer to dry the hard disk.
B. Immerse the hard disk in warm water to remove the coffee.
C. Place the hard disk in an air-sealed container.
D. Contact a network specialist.

A

C. Place the hard disk in an air-sealed container.

19
Q

You are working with management to justify the cost of a warm site versus a cold site. What factors can help justify the cost of a warm site? (Choose two.)
A. Large revenue loss during short downtime
B. Small revenue loss during long downtime
C. Customer contracts tolerating no more than 8 hours downtime
D. Customer contracts tolerating no more than 72 hours downtime

A

A. Large revenue loss during short downtime
&
C. Customer contracts tolerating no more than 8 hours downtime

20
Q

Your senior network administrator has decided that the five physical servers at your location will be virtualized and run on a single physical host. The five virtual guests will use the physical hard disks in the physical host. The physical host has the hard disks configured with RAID 1. Identify the flaw in this plan.
A. The physical server should be using RAID 5.
B. The physical hard disks must not reside in the physical host.
C. You cannot run five virtual machines on a physical host simultaneously.
D. The physical host is a single point of failure.

A

D. The physical host is a single point of failure.

21
Q

Your company is virtualizing DNS, DHCP, web, and e-mail servers at your location. Each of the four virtual machines will be spread out across two physical hosts. Virtual machines are using virtual hard disks, and these files exist on a SAN. Choose the best virtual machine backup strategy that will allow the quickest granular restore.
A. Back up the virtual machine hard disks at the SAN level.
B. Install a backup agent in each virtual machine and perform backups normally.
C. Duplicate your SAN disk array so that backups are not necessary.
D. All four virtual machines must run on the same physical host to be backed up.

A

B. Install a backup agent in each virtual machine and perform backups normally.

22
Q

What should you do when storing server backup tapes offsite?
A. Encrypt backed-up data.
B. Generate file hashes for each backed-up file.
C. Place backup tapes in static shielding bags.
D. It is a security violation to store backup tapes offsite.

A

A. Encrypt backed-up data.

23
Q

You are the administrator for a virtual Windows 2012 Server running Active Directory Domain Services (AD DS). Abnormal server behavior and finally a server freeze leads you to believe that the server has a virus infection. What should you do?
A. Revert to an earlier virtual machine snapshot prior to the virus infection.
B. Format the hard disk, reinstall the server, and restore from tape.
C. Refer to your DRP.
D. Refer to your ARP.

A

C. Refer to your DRP.

24
Q

What is the purpose of a disaster recovery plan? (Choose two.)
A. To minimize economic loss
B. To have a premeditated reaction to public relations blunders
C. To install confidence in shareholders
D. To earn a high rate of return annually

A

A. To minimize economic loss
&
C. To install confidence in shareholders

25
Q

Which of the following would appear on a DRP?
A. Prioritized list of critical computer systems
B. Single points of failure
C. Employee birth dates
D. Dollar value associated with an hour of downtime

A

A. Prioritized list of critical computer systems

26
Q

You are the network administrator for a small IT consulting firm. All servers are located at the single site. After testing the DRP and receiving management approval, you e-mail a copy to all employees for their reference in the event of a disaster. Identify the problem.
A. The e-mail should have been encrypted.
B. The e-mail should have been digitally signed.
C. Only executives should have received the message.
D. The mail server might not be available in the event of a disaster.

A

D. The mail server might not be available in the event of a disaster.

27
Q

You are the network administrator for a small IT consulting firm. All servers are hosted externally. After analyzing threats, creating a DRP, and receiving management approval, you
e-mail a copy to all employees for their reference in the event of a disaster. Identify the problem.
A. The e-mail should have been encrypted.
B. The DRP plan was not tested.
C. The e-mail should have been digitally signed.
D. Only executives should have received the message.

A

B. The DRP plan was not tested.

28
Q

Which of the following regarding disaster recovery are true? (Choose two.)
A. Once the plan is complete, it need never be revisited.
B. Once the plan is complete, it must have management approval.
C. The plan is never complete; it must evolve with the business.
D. The plan should include only IT systems.

A

B. Once the plan is complete, it must have management approval.
&
C. The plan is never complete; it must evolve with the business.

29
Q

You are a server administrator for a public cloud provider. To ensure compliance with customer SLAs, you must use reliable hard disks in your hardware to host the virtual environment used by cloud customers. Which of the following terms best describes the reliability of hard disks?
A. MTBF
B. MTTF
C. MTTR
D. RPO

A

B. MTTF

30
Q

As the IT director, you are comparing public cloud providers. Your company will no longer house on-premises mail or application servers. Which factors under your control must you consider to ensure mail and applications are always available to users?
A. Updates applied to cloud provider servers
B. Redundant network links
C. RAID level used on cloud provider servers
D. MTTF for cloud provider server hard disks

A

B. Redundant network links