Unit 2a Flashcards

1
Q

Processes of backup and restoral

A

Contingency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Formal policy provides authority and guidance necessary to develop effective plan

A

Develop Contingency Planning Policy Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Helps identify and prioritize info systems and components critical to supporting organization’s mission/business processes

A

Conduct Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Measures taken to reduce effects of system disruptions can increase system availability and reduce contingency life cycle costs

A

Identify Preventive Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Thorough recovery strategies ensure system can be recovered quickly and effectively following disruption

A

Create Contingency Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Plan should contain detailed guidance and procedures for restoring damaged system unique to system’s security impact level and recovery requirements

A

Develop Information System Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exercising plan identifies planning gaps; combined, activities improve plan effectiveness and overall organization preparedness

A

Ensure Plan Testing, Training, and Exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Plan is a living document and should be updated regularly to remain current with system enhancements and organizational changes

A

Ensure Plan Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Preserves authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guards against improper information modification or destruction, and
includes ensuring information nonrepudiation and authenticity

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ensures timely and reliable access to and use of information

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide means to restore local IT operations quickly and effectively following service disruption

A

Recovery Strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses on restoring an organization’s mission essential functions (MEF) at an alternate site and performing those functions for up to 30 days before returning to normal operations at original location

A

COOP (Continuity of Operations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Continuity of Operations Plan must include strategy to recover and perform system operations at alternate facility for extended period

A

Alternate Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consist of facility with adequate space/infrastructure to support IT

A

Cold Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Partially equipped office spaces containing some or all system hardware, software, telecommunications, and power sources

A

Warm Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Office spaces appropriately sized to support system requirements and fully configured and ready to operate within a few hours

A

Hot Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One site equipped and configured exactly like primary site

A

Mirrored Sites

19
Q

Back of large truck or trailer turned into data processing or working area

A

Mobile Hot Sites

20
Q

Normally applies to mission/business itself. It is concerned with ability to continue critical functions and processes during and after an emergency event.

A

Continuity Planning

21
Q

Normally applies to information systems and provides steps needed to recover operation of all or part of designated information systems at existing or new location in an emergency.

A

Contingency Planning

22
Q

Provides procedures for sustaining mission/business operations while recovering from significant disruption

A

Business Continuity Plan

23
Q

Provides key information needed for system recovery including roles and responsibilities, inventory information, assessment procedures, detailed recovery procedures, and testing of system

A

Information System Contingency Plan

24
Q

Provides procedures for mitigating and correcting from cyber-attack (virus, worm, or Trojan horse)

A

Cyber Incident Response Plan

25
Q

Provides procedures for relocating information systems operations to alternate location

A

Disaster Recovery Plan

26
Q

Provides coordinated procedures for minimizing loss of life or injury and protecting property damage in response to physical threat

A

Occupant Emergency Plan

27
Q

Prioritizing recovery strategies, network administrator may make more informed, tailored decisions regarding contingency resource allocations and expenditures thereby saving time, effort, and costs ensuring an organization’s mission continues without delay

A

Priority Systems

28
Q

Certain network system devices are of primary consideration in contingency backup and restoration plan, which are they?

A

E-mail servers, DHCP servers, Domain Controllers, File servers containing mission critical information, Web servers, Specialized systems necessary in war zone environment

29
Q

Copy of data or program files created for archiving or safekeeping

A

Data Backup

30
Q

To ensure lost data, no matter how it got lost, can be recovered quickly, efficiently and as completely as possible

A

Data Backup Strategy

31
Q

File attribute that can be checked (set to “on”) or unchecked (set to “off”) to indicate whether file must be archived

A

Archive Bit

32
Q

Starting point for all other backups, containing all data in folders and files regardless of whether data is new or has changed

A

Full Data Backup

33
Q

Backups all selected files and folders changed during the day

A

Daily Data Backup

34
Q

Processes only files that are new or have changed since last full or incremental backup, unchecks archive bit

A

Incremental Data Backup

35
Q

Processes only selected files and folders that have changed since last full backup, does not uncheck archive bit

A

Differential Data Backup

36
Q

Refers to location away from computer center where paper copies and backup media kept

A

Offsite Storage Facility

37
Q

Distance from organization and probability of storage site being affected by same disaster as organization

A

Geographic Area

38
Q

Length of time necessary to retrieve data from storage and storage facility’s operating hours

A

Accessibility

39
Q

Security capabilities of storage facility and employee confidentiality which must meet data’s sensitivity and security requirements

A

Security

40
Q

Structural and environmental conditions of the storage facility

A

Environment

41
Q

Unscheduled network, equipment, or application outages or degradations caused by such things as environmental problems (e.g., fire, flood, loss of power, loss of air conditioning), equipment malfunctions, system crashes, etc.

A

Unscheduled Service Interruptions (USI)

42
Q

Picks up load after power failure much quicker than standby UPS but at higher cost, uses AC line voltage to charge bank of batteries

A

Online UPS

43
Q

Inactive until power grid fails

A

Standby UPS