Filters
Question type

Study Flashcards

____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.


A) BIA
B) Contingency
C) Maintenance
D) Redundant

Correct Answer

verifed

verified

Data from the ____ of major applications and general support systems should be used to determine the recovery requirements and priorities to implement.


A) alert log
B) signature log
C) BIA
D) system log

Correct Answer

verifed

verified

____ are those that occur suddenly,with little warning,taking the lives of people and destroying the means of production.


A) Slow onset disasters
B) Communication disasters
C) Rapid onset disasters
D) Data disasters

Correct Answer

verifed

verified

______________________________ is the preparation for and recovery from a disaster,whether natural or man-made.

Correct Answer

verifed

verified

Disaster r...

View Answer

Which of the following is not usually an insurable loss?


A) Electrostatic discharge
B) Sever windstorm
C) Fire
D) Lightening

Correct Answer

verifed

verified

Match each statement with an item below. -The command and control group responsible for all planning and coordination activities.


A) Disaster management team
B) Business interface team
C) Actions after
D) Network recovery team
E) Storage recovery team
F) Data management team
G) Vendor contact team.
H) Logistics team.
I) Business interface team.

Correct Answer

verifed

verified

Match each statement with an item below. -During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.


A) Disaster management team
B) Business interface team
C) Actions after
D) Network recovery team
E) Storage recovery team
F) Data management team
G) Vendor contact team.
H) Logistics team.
I) Business interface team.

Correct Answer

verifed

verified

The ____________________ is a detailed examination of the events that occurred from first detection to final recovery.

Correct Answer

verifed

verified

after-action review
...

View Answer

A ____ is owned by a single organization;it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.


A) honeypot
B) cache
C) filter
D) LAN

Correct Answer

verifed

verified

Match each statement with an item below. -Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.


A) Disaster management team
B) Business interface team
C) Actions after
D) Network recovery team
E) Storage recovery team
F) Data management team
G) Vendor contact team.
H) Logistics team.
I) Business interface team.

Correct Answer

verifed

verified

____ may be caused by earthquakes,floods,storm winds,tornadoes,or mud flows.


A) Slow onset disasters
B) Communication disasters
C) Rapid onset disasters
D) Data disasters

Correct Answer

verifed

verified

____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.


A) Slow onset disasters
B) Communication disasters
C) Rapid onset disasters
D) Data disasters

Correct Answer

verifed

verified

A

When selecting an off-site storage location for data backups or stored equipment,extra care should be taken to increase the risk at that storage location.

Correct Answer

verifed

verified

In disaster recovery,the ____ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.


A) mirrored site
B) hot site
C) cold site
D) trigger

Correct Answer

verifed

verified

____ support file sharing and storage,data processing,central application hosting (such as e-mail or a central database) ,printing,access control,user authentication,remote access connectivity,and other shared network services.


A) Servers
B) Honeypots
C) Filters
D) Clusters

Correct Answer

verifed

verified

A

Distributed system contingency strategies typically reflect the system's reliance on ____________________ and ____________________ availability.

Correct Answer

verifed

verified

LAN,WAN
WAN,LAN
local area net...

View Answer

____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.


A) After-action review
B) Hashing
C) Forensics analysis
D) Clustering

Correct Answer

verifed

verified

C

In disaster recovery,most triggers are in response to one or more natural events.

Correct Answer

verifed

verified

The disaster response,like incident response,usually begins with a(n)____________________.

Correct Answer

verifed

verified

List five contingency strategies that should be considered for servers.

Correct Answer

verifed

verified

Among the strategies that should be cons...

View Answer

Showing 1 - 20 of 50

Related Exams

Show Answer