Deck 7: Disaster Recovery: Preparation and Implementation
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
العب
ملء الشاشة (f)
Deck 7: Disaster Recovery: Preparation and Implementation
1
The ____ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.
A)forensic report
B)DR planning document
C)event schedule
D)contingency report
A)forensic report
B)DR planning document
C)event schedule
D)contingency report
B
2
____ are likely in the event of a hacker attack,when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of their latest conquest.
A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
A
3
____ may be caused by earthquakes,floods,storm winds,tornadoes,or mud flows.
A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
C
4
A ____ is owned by a single organization;it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.
A)honeypot
B)cache
C)filter
D)LAN
A)honeypot
B)cache
C)filter
D)LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.
A)After-action review
B)Hashing
C)Forensics analysis
D)Clustering
A)After-action review
B)Hashing
C)Forensics analysis
D)Clustering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.
A)security
B)contingency
C)maintenance
D)cache
A)security
B)contingency
C)maintenance
D)cache
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.
A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Data from the ____ of major applications and general support systems should be used to determine the recovery requirements and priorities to implement.
A)alert log
B)signature log
C)BIA
D)system log
A)alert log
B)signature log
C)BIA
D)system log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
In disaster recovery,most triggers are in response to one or more natural events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ considerations for desktop and portable systems should emphasize data availability,confidentiality,and integrity.
A)Forensic
B)Contingency
C)Hashing
D)Black bag
A)Forensic
B)Contingency
C)Hashing
D)Black bag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
In disaster recovery,the ____ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.
A)mirrored site
B)hot site
C)cold site
D)trigger
A)mirrored site
B)hot site
C)cold site
D)trigger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Natural disasters such as earthquakes can usually be mitigated with multipurpose casualty insurance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Before returning to routine duties,the IR team must also conduct a(n)____.
A)chain of custody
B)after-action review
C)war game
D)Alarm Compaction
A)chain of custody
B)after-action review
C)war game
D)Alarm Compaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ are those that occur suddenly,with little warning,taking the lives of people and destroying the means of production.
A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ support file sharing and storage,data processing,central application hosting (such as e-mail or a central database),printing,access control,user authentication,remote access connectivity,and other shared network services.
A)Servers
B)Honeypots
C)Filters
D)Clusters
A)Servers
B)Honeypots
C)Filters
D)Clusters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Once the incident has been contained,and all signs of the incident removed,the ____ phase begins.
A)actions after
B)black bag operation
C)chain of custody
D)blue bag operation
A)actions after
B)black bag operation
C)chain of custody
D)blue bag operation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.
A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
When selecting an off-site storage location for data backups or stored equipment,extra care should be taken to increase the risk at that storage location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
____ system components are critical to ensure that a failure of a system component,such as a power supply,does not cause a system failure.
A)Redundant
B)Contingency
C)BIA
D)Redundant
A)Redundant
B)Contingency
C)BIA
D)Redundant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match each statement with an item below.
-Works to reestablish functions by repairing or replacing damaged or destroyed components.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-Works to reestablish functions by repairing or replacing damaged or destroyed components.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
______________________________ is the preparation for and recovery from a disaster,whether natural or man-made.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each statement with an item below.
-The command and control group responsible for all planning and coordination activities.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-The command and control group responsible for all planning and coordination activities.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each statement with an item below.
-This group is expected to quickly assess the recoverability of data from systems on site and then make recommendations to the management team as to whether off-site data recovery is needed.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-This group is expected to quickly assess the recoverability of data from systems on site and then make recommendations to the management team as to whether off-site data recovery is needed.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each statement with an item below.
-Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ systems are implemented in environments in which clients and users are widely dispersed.
A)Security
B)DNS systems
C)Redundant
D)Distributed
A)Security
B)DNS systems
C)Redundant
D)Distributed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match each statement with an item below.
-During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each statement with an item below.
-This group may also interface with the data management group to restore data from backups to their storage areas.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-This group may also interface with the data management group to restore data from backups to their storage areas.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
When developing the LAN contingency plan,the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.
A)events
B)filters
C)single points of failure
D)servers
A)events
B)filters
C)single points of failure
D)servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each statement with an item below.
-This group consists of the individuals responsible for providing any needed supplies,space,materials,food,services,or facilities needed at the primary site.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-This group consists of the individuals responsible for providing any needed supplies,space,materials,food,services,or facilities needed at the primary site.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
The disaster response,like incident response,usually begins with a(n)____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.
A)BIA
B)Contingency
C)Maintenance
D)Redundant
A)BIA
B)Contingency
C)Maintenance
D)Redundant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Distributed system contingency strategies typically reflect the system's reliance on ____________________ and ____________________ availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ____________________ is a detailed examination of the events that occurred from first detection to final recovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The ________________________________________ assembles a disaster recovery team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.
A)Cache
B)Server
C)Web site
D)WAN
A)Cache
B)Server
C)Web site
D)WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match each statement with an item below.
-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team.
E)Storage recovery team.
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team.
E)Storage recovery team.
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each statement with an item below.
-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team.
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.
A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team.
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is not usually an insurable loss?
A)Electrostatic discharge
B)Sever windstorm
C)Fire
D)Lightening
A)Electrostatic discharge
B)Sever windstorm
C)Fire
D)Lightening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
List five practices for Web site contingency planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
List six strategies that should be considered for desktop computer and portable systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List five practices that should be considered when addressing server vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List five contingency strategies that should be considered for LANs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List five contingency strategies to be considered for Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What measures should be considered when determining mainframe contingency requirements?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
List five strategies that should be considered for distributed systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List five strategies that should be considered for mainframe systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is involved in training for the DR plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List five contingency strategies that should be considered for servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck