Security Architecture Domain 5 Flashcards

1
Q

BCP is defined as:

A
  • Preparation that facilitates the rapid recovery of mission-critical
    business operations
  • The reduction of the impact of a disaster
  • The continuation of critical business functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DRP is defined as:

A

A subset of BCP that emphasizes the procedures for emergency
response relating to the information infrastructure of the
organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DRP includes:

A
  • Extended backup operations
  • Post-disaster recovery for data center, network, and
    computer resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While performing the BIA, security architects should avoid using the term critical or essential in defining the processes or people during this phase of the planning. Instead, use the term __________

A

Time sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All applications, and the business functions that they support, need to be classified as to their time sensitivity for recovery even if they do not support business functions that are time sensitive. For applications, this is commonly referred to as

A

Recovery Time Objective (RTO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the amount of time the business can function without that application before significant business impact occurs.

A

Recovery Time Objective (RTO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decisions need to be made about all types of data because data is what is needed to run the business. How much data is it acceptable to lose? A minutes worth? An hour’s worth? A whole business day’s worth? The answers to these questions are used to determine the

A

Recovery Point Objective (RPO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The RTO is determined during the …

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BS 25999-2 was a British standard issued in 2007, which quickly became the main standard for business continuity management - although it is a British national standard, it was used in many other countries; on May 15, 2012 BS25999-2 was replaced by international standard

A

ISO 22301.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In addition to BS 25999-2, BS 25999-1 is an “auxiliary” standard which provides more details on

A

how to implement specific parts of BS 25999-2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO 22301

A

is the new de-facto standard for Business Continuity Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO/IEC 27031

A
  • Guidelines for information and communication
    technology readiness for business continuity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PAS 200

A

Crisis management - Guidance and good practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PD 25666

A
  • Guidance on exercising and testing for continuity and
    contingency programmes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PD 25111

A
  • Guidance on human aspects of business continuity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISO/IEC 24762

A
  • Guidelines for information and communications
    technology disaster recovery services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISO/PAS 22399

A
  • Guideline for incident preparedness and
    operational continuity management 32
18
Q

ISO/IEC 27001

A
  • Information security management systems-
    Requirements 33
19
Q

NIST Special Publication 800-34 Rev 1 -

A

Contingency Planning
Guide for Federal Information Systems 34

20
Q

Incremental backups take copies of only the files that are new or have changed since

A

the last full OR incremental backup was taken, and then set the
archive bit to “0.”

21
Q

Differential backups copy only the files that are new or have changed since

A

the last full backup and do not change the archive bit value.

22
Q

If an organization wants the backup and recovery strategy to be as simple as possible, then they should only use ______ backups.

23
Q

In how many steps can a differential backup be restored

24
Q

Which backup takes the longest to restore

A

Incremental

25
Q

What is a synthetic full backup

A

the backup server actually produces full backups. It does this by combining the existing full backup with the data from the incremental backups.

26
Q

What is an incremental-forever backup

A

The basic idea is that like an incremental backup, the incremental-
forever backup begins by taking a full backup of the data set. After that point, only incremental backups are taken.

27
Q

A Mirror backup

A

A mirror backup is a straight copy of the selected folders and files at a given instant in time.

28
Q

This type of backup is often described as a “bare metal backup” because it backs up physical disks at the volume level.

A

Disk Imaging

29
Q

The main difference between file synchronization and backup solutions is that

A

a backup will copy files in one direction, while
synchronization copies files (or changes) in two directions.

30
Q

One-way synchronisation differs from traditional backups when

A

the propagation of deletions or renames is performed, because backups do not generally delete files, and a renamed file is usually copied again.

31
Q

The most common recovery strategies

A

Dual Data Center
Internal Hot Site
External Hot Site
Warm Site
Cold Site
Reciprocal Agreement
Mobile Unit
Outsourcing/Cloud

32
Q

A business impact analysis identifies what would happen to the organization if a risk occurred, despite whatever controls were in place.
The term disaster recovery commonly refers to:
A. The recovery of the business operations.
B. The recovery of the technology environment.
C. The recovery of the manufacturing environment.
D. The recovery of the business and technology environments.

A

The correct option is B
Disaster recovery has been commonly used to define the process and procedures used to recover the technology supporting the business operations.

33
Q

Wassenaar Arrangement (WA) -

A

is a multilateral export control regime established in 1996 to regulate the transfer of conventional arms and dual-use goods and technologies to enhance global security and prevent their proliferation to unauthorized destinations. It includes 42 participating countries that voluntarily agree to its guidelines.

34
Q

The Center for Information on Security Trade Control (CISTEC), is the

A

Government of Japan’s clearing house for information pertaining to export activities and regime compliance’.

35
Q

What are the different types of cards used in an ACS

A

Magnetic Stripe (mag stripe) cards
Proximity Cards (prox cards)
Smart Cards are credential cards with a microchip embedded
inside.

36
Q

PIV

A

PIV (Personal Identity Verification) is a smart card-based authentication system used primarily by U.S. federal agencies. It is designed to provide strong, multi-factor authentication for access to secure government systems and facilities.

37
Q

The design process of a security plan for a new facility should begin with ________ then the ________ and finally the _______________

A

the interior,
then the exterior,
and finally the outer
perimeter.

38
Q

What is SCIF

A

Sensitive Compartmental Information Facilities (SCIF)

39
Q

______________ are/is the most important consideration for any security plan

40
Q

Security is a dynamic process, and for it to be effective, it must be ______________

A

procedural

41
Q

How would you validate a physical security design

A

Penetration testing

42
Q
  1. How must classified material and sensitive information be disposed of?
    A. Torn in half and thrown in the trash can.
    B. It should be shredded.
    C. Removed to a decontamination room.
    D. Marked declassified and thrown in a trash can.
A

The correct option is B
There are several methods for proper destruction of information. An organisation can contract with a licensed and bonded shredding company, which will come to the site with a mobile shredding truck and dispose of classified material and
sensitive information.
One can watch the process and verify the destruction, or the documents can be shredded on site, depending on the volume of information that needs to be destroyed. Shredding services can also destroy hard drives and physical components.