Deck 11: Contingency Planning and Networking Incident Response

ملء الشاشة (f)
exit full mode
سؤال
NAS works well with real-time applications because of the latency of the communication methods.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ planning ensures that critical business functions can continue if a disaster occurs.

A) Business response
C) Incident response
B) Business continuity planning
D) Disaster recovery
سؤال
A(n) ____ backup is the storage of all files that have changed or have been added since the last full backup.

A) full
C) incremental
B) half
D) differential
سؤال
The actions an organization should take while an incident is in progress are defined in a document referred to as the ____ plan.

A) business response (BR)
C) incident response (IR)
B) business impact analysis (BIA)
D) disaster recovery (DR)
سؤال
____ are the representative collection of individuals with a stake in the successful and uninterrupted operation of the organization's information infrastructure.

A) Product developers
C) Incident responders
B) Stakeholders
D) Vendors
سؤال
Incident response focuses on immediate response to small-scale events.
سؤال
Which backup method allows for easy full-system restorations (no shuffling through tapes with partial backups on them)?

A) RAID
C) Grandfather-Father-Son (GFS)
B) The Towers of Hanoi
D) Six-tape rotation
سؤال
The key role of a(n) ____ is defining how to reestablish operations at the location where the organization usually operates.

A) business response (BR)
C) incident response (IR)
B) business impact analysis (BIA)
D) disaster recovery (DR)
سؤال
RAID is a replacement for backup and recovery processes.
سؤال
The bulk transfer of data in batches to an off-site facility is called ____.

A) electronic vaulting
C) bare metal recovery
B) server clustering
D) remote journaling
سؤال
A(n) ____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.

A) event
C) trigger
B) incident
D) RAID occurrence
سؤال
The business impact analysis (BIA) is the first major component of the CP process.
سؤال
____ techniques are generally used by organizations needing immediate data recovery after an incident or disaster.

A) Shadowing
C) Bare metal recovery
B) Clustering
D) Journaling
سؤال
In some organizations, which two plans are considered to be one plan, known as the Business Resumption Plan?

A) BIA plan and BC plan
C) DR plan and IR plan
B) IR plan and BC plan
D) DR plan and BC plan
سؤال
____ clustering is a more complex model in which all members of a cluster simultaneously provide application services.

A) Passive/active
C) Active/passive
B) Passive/passive
D) Active/active
سؤال
The final phase of the IR planning function is plan maintenance.
سؤال
____ is the transfer of live transactions to an off-site facility.

A) Electronic vaulting
C) Bare metal recovery
B) Server clustering
D) Remote journaling
سؤال
What is a drawback of tape backups?

A) Time required to store and retrieve information
B) Cost of the media
C) Limited selection of the media
D) Small size of the tape media capacity
سؤال
Which team is responsible for conducting the BIA?

A) CP Management Team (CPMT)
C) Incident response (IR) team
B) Business continuity (BC) team
D) Disaster recovery (DR) team
سؤال
Which cloud type acts as a collaboration between a few entities for the sole benefit of those entities?

A) Common clouds
C) Public clouds
B) Community clouds
D) Private clouds
سؤال
A(n) ____________________ backup only archives the data that have been modified since the last backup (regardless of type), and thus requires less space and time than a differential backup.
سؤال
Incident ____ is the process of evaluating organizational events, determining which events are possible incidents, also called incident candidates, and then determining whether or not the incident candidate is an actual incident or a nonevent, also called a false positive incident candidate.

A) identification
C) vulnerability
B) journal
D) classification
سؤال
The ____, which is also known as the Security Incident Response Team (SIRT), is the group of individuals who would be expected to respond to a detected incident.

A) CP Management Team (CPMT)
B) disaster recovery (DR) team
C) Computer Security Incident Response Team (CSIRT)
D) business continuity (BC) team
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Is most commonly used in organizations that balance safety and redundancy against the costs of acquiring and operating the systems.
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
A specialized form of disk striping with parity; is not widely used
سؤال
According to D. L. Pipkin, ____ is a definite indicator of an actual incident.

A) notification from intrusion detection system (IDS)
B) activities at unexpected times
C) use of dormant accounts
D) presence of new accounts
سؤال
The identification of an incident begins with the ____________________ - that is, the circumstances that cause the IR team to be activated and the IR plan to be initiated.
سؤال
The ____ review entails a detailed examination of the events that occurred from first detection to final recovery.

A) after-action
C) desk check
B) incident classification
D) structured walk-through
سؤال
____________________ are the contractual documents guaranteeing certain minimum levels of service provided by vendors.
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Commonly called disk mirroring
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Uses block-level striping of data
سؤال
Which strategy to test contingency plans involves team members acting as defenders, using their own equipment or a duplicate environment, against realistic attacks executed by external information security professionals?

A) Parallel testing
C) Simulation
B) War gaming
D) Structured walk-through
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Often called disk striping without parity
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Uses byte-level striping of data
سؤال
____________________ is the process by which the information technology and information security teams position their organizations to prepare for, detect, react to, and recover from man-made or natural events that threaten the security of information resources and assets.
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Is very similar to RAID 5; however, this level adds another layer of parity data striped across the drives
سؤال
Database ____________________ is the propagation of transactions to a remote copy of the database.
سؤال
A(n) ____ is a detailed description of the activities that occur during an attack, including the preliminary indications of the attack as well as the actions taken and the outcome.

A) trigger
C) event
B) database journal
D) attack profile
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
A proprietary variation on RAID 5 in which the array works as a single virtual drive
سؤال
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Referred to as RAID 1+0, which combines the benefits of RAID 0 and RAID 1
سؤال
List five good information security practices that prevent attacks on the desktop.
سؤال
Describe the two criteria that may cause a disaster occurrence.
سؤال
Describe the Grandfather-Father-Son (GFS) backup method.
سؤال
List the four integrated contingency planning (CP) components.
سؤال
According to NIST Special Publication 800-34 Rev.1, what are the three distinct phases an organization goes through when reacting to an event that is determined to pose a threat to the organization?
سؤال
Compare the protect and forget strategy with the apprehend and prosecute strategy.
سؤال
What are the two key facets of incident detection?
سؤال
Describe a strategy for implementing server recovery and redundancy through mirroring servers.
سؤال
Compare a sequential roster to a hierarchical roster.
سؤال
Describe the three forms of cloud computing.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Contingency Planning and Networking Incident Response
1
NAS works well with real-time applications because of the latency of the communication methods.
False
2
____ planning ensures that critical business functions can continue if a disaster occurs.

A) Business response
C) Incident response
B) Business continuity planning
D) Disaster recovery
B
3
A(n) ____ backup is the storage of all files that have changed or have been added since the last full backup.

A) full
C) incremental
B) half
D) differential
D
4
The actions an organization should take while an incident is in progress are defined in a document referred to as the ____ plan.

A) business response (BR)
C) incident response (IR)
B) business impact analysis (BIA)
D) disaster recovery (DR)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ are the representative collection of individuals with a stake in the successful and uninterrupted operation of the organization's information infrastructure.

A) Product developers
C) Incident responders
B) Stakeholders
D) Vendors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Incident response focuses on immediate response to small-scale events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which backup method allows for easy full-system restorations (no shuffling through tapes with partial backups on them)?

A) RAID
C) Grandfather-Father-Son (GFS)
B) The Towers of Hanoi
D) Six-tape rotation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The key role of a(n) ____ is defining how to reestablish operations at the location where the organization usually operates.

A) business response (BR)
C) incident response (IR)
B) business impact analysis (BIA)
D) disaster recovery (DR)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
RAID is a replacement for backup and recovery processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
The bulk transfer of data in batches to an off-site facility is called ____.

A) electronic vaulting
C) bare metal recovery
B) server clustering
D) remote journaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A(n) ____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.

A) event
C) trigger
B) incident
D) RAID occurrence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The business impact analysis (BIA) is the first major component of the CP process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ techniques are generally used by organizations needing immediate data recovery after an incident or disaster.

A) Shadowing
C) Bare metal recovery
B) Clustering
D) Journaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
In some organizations, which two plans are considered to be one plan, known as the Business Resumption Plan?

A) BIA plan and BC plan
C) DR plan and IR plan
B) IR plan and BC plan
D) DR plan and BC plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ clustering is a more complex model in which all members of a cluster simultaneously provide application services.

A) Passive/active
C) Active/passive
B) Passive/passive
D) Active/active
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
The final phase of the IR planning function is plan maintenance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ is the transfer of live transactions to an off-site facility.

A) Electronic vaulting
C) Bare metal recovery
B) Server clustering
D) Remote journaling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is a drawback of tape backups?

A) Time required to store and retrieve information
B) Cost of the media
C) Limited selection of the media
D) Small size of the tape media capacity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which team is responsible for conducting the BIA?

A) CP Management Team (CPMT)
C) Incident response (IR) team
B) Business continuity (BC) team
D) Disaster recovery (DR) team
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which cloud type acts as a collaboration between a few entities for the sole benefit of those entities?

A) Common clouds
C) Public clouds
B) Community clouds
D) Private clouds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n) ____________________ backup only archives the data that have been modified since the last backup (regardless of type), and thus requires less space and time than a differential backup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Incident ____ is the process of evaluating organizational events, determining which events are possible incidents, also called incident candidates, and then determining whether or not the incident candidate is an actual incident or a nonevent, also called a false positive incident candidate.

A) identification
C) vulnerability
B) journal
D) classification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ____, which is also known as the Security Incident Response Team (SIRT), is the group of individuals who would be expected to respond to a detected incident.

A) CP Management Team (CPMT)
B) disaster recovery (DR) team
C) Computer Security Incident Response Team (CSIRT)
D) business continuity (BC) team
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Is most commonly used in organizations that balance safety and redundancy against the costs of acquiring and operating the systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
A specialized form of disk striping with parity; is not widely used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
According to D. L. Pipkin, ____ is a definite indicator of an actual incident.

A) notification from intrusion detection system (IDS)
B) activities at unexpected times
C) use of dormant accounts
D) presence of new accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
The identification of an incident begins with the ____________________ - that is, the circumstances that cause the IR team to be activated and the IR plan to be initiated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
The ____ review entails a detailed examination of the events that occurred from first detection to final recovery.

A) after-action
C) desk check
B) incident classification
D) structured walk-through
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
____________________ are the contractual documents guaranteeing certain minimum levels of service provided by vendors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Commonly called disk mirroring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Uses block-level striping of data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which strategy to test contingency plans involves team members acting as defenders, using their own equipment or a duplicate environment, against realistic attacks executed by external information security professionals?

A) Parallel testing
C) Simulation
B) War gaming
D) Structured walk-through
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Often called disk striping without parity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Uses byte-level striping of data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
____________________ is the process by which the information technology and information security teams position their organizations to prepare for, detect, react to, and recover from man-made or natural events that threaten the security of information resources and assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Is very similar to RAID 5; however, this level adds another layer of parity data striped across the drives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Database ____________________ is the propagation of transactions to a remote copy of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n) ____ is a detailed description of the activities that occur during an attack, including the preliminary indications of the attack as well as the actions taken and the outcome.

A) trigger
C) event
B) database journal
D) attack profile
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
A proprietary variation on RAID 5 in which the array works as a single virtual drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
Referred to as RAID 1+0, which combines the benefits of RAID 0 and RAID 1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
List five good information security practices that prevent attacks on the desktop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe the two criteria that may cause a disaster occurrence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe the Grandfather-Father-Son (GFS) backup method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List the four integrated contingency planning (CP) components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
According to NIST Special Publication 800-34 Rev.1, what are the three distinct phases an organization goes through when reacting to an event that is determined to pose a threat to the organization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Compare the protect and forget strategy with the apprehend and prosecute strategy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are the two key facets of incident detection?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe a strategy for implementing server recovery and redundancy through mirroring servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Compare a sequential roster to a hierarchical roster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe the three forms of cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.