Unit 2a Flashcards

1
Q

Processes of backup and restoral

A

Contingency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Formal policy provides authority and guidance necessary to develop effective plan

A

Develop Contingency Planning Policy Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Helps identify and prioritize info systems and components critical to supporting organization’s mission/business processes

A

Conduct Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Measures taken to reduce effects of system disruptions can increase system availability and reduce contingency life cycle costs

A

Identify Preventive Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Thorough recovery strategies ensure system can be recovered quickly and effectively following disruption

A

Create Contingency Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Plan should contain detailed guidance and procedures for restoring damaged system unique to system’s security impact level and recovery requirements

A

Develop Information System Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exercising plan identifies planning gaps; combined, activities improve plan effectiveness and overall organization preparedness

A

Ensure Plan Testing, Training, and Exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Plan is a living document and should be updated regularly to remain current with system enhancements and organizational changes

A

Ensure Plan Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Preserves authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guards against improper information modification or destruction, and
includes ensuring information nonrepudiation and authenticity

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ensures timely and reliable access to and use of information

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide means to restore local IT operations quickly and effectively following service disruption

A

Recovery Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses on restoring an organization’s mission essential functions (MEF) at an alternate site and performing those functions for up to 30 days before returning to normal operations at original location

A

COOP (Continuity of Operations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Continuity of Operations Plan must include strategy to recover and perform system operations at alternate facility for extended period

A

Alternate Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consist of facility with adequate space/infrastructure to support IT

A

Cold Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Partially equipped office spaces containing some or all system hardware, software, telecommunications, and power sources

A

Warm Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Office spaces appropriately sized to support system requirements and fully configured and ready to operate within a few hours

A

Hot Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One site equipped and configured exactly like primary site

A

Mirrored Sites

19
Q

Back of large truck or trailer turned into data processing or working area

A

Mobile Hot Sites

20
Q

Normally applies to mission/business itself. It is concerned with ability to continue critical functions and processes during and after an emergency event.

A

Continuity Planning

21
Q

Normally applies to information systems and provides steps needed to recover operation of all or part of designated information systems at existing or new location in an emergency.

A

Contingency Planning

22
Q

Provides procedures for sustaining mission/business operations while recovering from significant disruption

A

Business Continuity Plan

23
Q

Provides key information needed for system recovery including roles and responsibilities, inventory information, assessment procedures, detailed recovery procedures, and testing of system

A

Information System Contingency Plan

24
Q

Provides procedures for mitigating and correcting from cyber-attack (virus, worm, or Trojan horse)

A

Cyber Incident Response Plan

25
Provides procedures for relocating information systems operations to alternate location
Disaster Recovery Plan
26
Provides coordinated procedures for minimizing loss of life or injury and protecting property damage in response to physical threat
Occupant Emergency Plan
27
Prioritizing recovery strategies, network administrator may make more informed, tailored decisions regarding contingency resource allocations and expenditures thereby saving time, effort, and costs ensuring an organization’s mission continues without delay
Priority Systems
28
Certain network system devices are of primary consideration in contingency backup and restoration plan, which are they?
E-mail servers, DHCP servers, Domain Controllers, File servers containing mission critical information, Web servers, Specialized systems necessary in war zone environment
29
Copy of data or program files created for archiving or safekeeping
Data Backup
30
To ensure lost data, no matter how it got lost, can be recovered quickly, efficiently and as completely as possible
Data Backup Strategy
31
File attribute that can be checked (set to “on”) or unchecked (set to “off") to indicate whether file must be archived
Archive Bit
32
Starting point for all other backups, containing all data in folders and files regardless of whether data is new or has changed
Full Data Backup
33
Backups all selected files and folders changed during the day
Daily Data Backup
34
Processes only files that are new or have changed since last full or incremental backup, unchecks archive bit
Incremental Data Backup
35
Processes only selected files and folders that have changed since last full backup, does not uncheck archive bit
Differential Data Backup
36
Refers to location away from computer center where paper copies and backup media kept
Offsite Storage Facility
37
Distance from organization and probability of storage site being affected by same disaster as organization
Geographic Area
38
Length of time necessary to retrieve data from storage and storage facility’s operating hours
Accessibility
39
Security capabilities of storage facility and employee confidentiality which must meet data’s sensitivity and security requirements
Security
40
Structural and environmental conditions of the storage facility
Environment
41
Unscheduled network, equipment, or application outages or degradations caused by such things as environmental problems (e.g., fire, flood, loss of power, loss of air conditioning), equipment malfunctions, system crashes, etc.
Unscheduled Service Interruptions (USI)
42
Picks up load after power failure much quicker than standby UPS but at higher cost, uses AC line voltage to charge bank of batteries
Online UPS
43
Inactive until power grid fails
Standby UPS