Deck 7: Disaster Recovery: Preparation and Implementation

ملء الشاشة (f)
exit full mode
سؤال
The ____ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.

A)forensic report
B)DR planning document
C)event schedule
D)contingency report
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ are likely in the event of a hacker attack,when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of their latest conquest.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
سؤال
____ may be caused by earthquakes,floods,storm winds,tornadoes,or mud flows.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
سؤال
A ____ is owned by a single organization;it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.

A)honeypot
B)cache
C)filter
D)LAN
سؤال
____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.

A)After-action review
B)Hashing
C)Forensics analysis
D)Clustering
سؤال
Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.

A)security
B)contingency
C)maintenance
D)cache
سؤال
____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
سؤال
Data from the ____ of major applications and general support systems should be used to determine the recovery requirements and priorities to implement.

A)alert log
B)signature log
C)BIA
D)system log
سؤال
In disaster recovery,most triggers are in response to one or more natural events.
سؤال
____ considerations for desktop and portable systems should emphasize data availability,confidentiality,and integrity.

A)Forensic
B)Contingency
C)Hashing
D)Black bag
سؤال
In disaster recovery,the ____ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.

A)mirrored site
B)hot site
C)cold site
D)trigger
سؤال
The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
سؤال
Natural disasters such as earthquakes can usually be mitigated with multipurpose casualty insurance.
سؤال
Before returning to routine duties,the IR team must also conduct a(n)____.

A)chain of custody
B)after-action review
C)war game
D)Alarm Compaction
سؤال
____ are those that occur suddenly,with little warning,taking the lives of people and destroying the means of production.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
سؤال
____ support file sharing and storage,data processing,central application hosting (such as e-mail or a central database),printing,access control,user authentication,remote access connectivity,and other shared network services.

A)Servers
B)Honeypots
C)Filters
D)Clusters
سؤال
Once the incident has been contained,and all signs of the incident removed,the ____ phase begins.

A)actions after
B)black bag operation
C)chain of custody
D)blue bag operation
سؤال
A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
سؤال
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
سؤال
When selecting an off-site storage location for data backups or stored equipment,extra care should be taken to increase the risk at that storage location.
سؤال
____ system components are critical to ensure that a failure of a system component,such as a power supply,does not cause a system failure.

A)Redundant
B)Contingency
C)BIA
D)Redundant
سؤال
Match each statement with an item below.

-Works to reestablish functions by repairing or replacing damaged or destroyed components.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
______________________________ is the preparation for and recovery from a disaster,whether natural or man-made.
سؤال
Match each statement with an item below.

-The command and control group responsible for all planning and coordination activities.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
Match each statement with an item below.

-This group is expected to quickly assess the recoverability of data from systems on site and then make recommendations to the management team as to whether off-site data recovery is needed.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
Match each statement with an item below.

-Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
____ systems are implemented in environments in which clients and users are widely dispersed.

A)Security
B)DNS systems
C)Redundant
D)Distributed
سؤال
Match each statement with an item below.

-During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
Match each statement with an item below.

-This group may also interface with the data management group to restore data from backups to their storage areas.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
When developing the LAN contingency plan,the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.

A)events
B)filters
C)single points of failure
D)servers
سؤال
Match each statement with an item below.

-This group consists of the individuals responsible for providing any needed supplies,space,materials,food,services,or facilities needed at the primary site.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
The disaster response,like incident response,usually begins with a(n)____________________.
سؤال
____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.

A)BIA
B)Contingency
C)Maintenance
D)Redundant
سؤال
Distributed system contingency strategies typically reflect the system's reliance on ____________________ and ____________________ availability.
سؤال
The ____________________ is a detailed examination of the events that occurred from first detection to final recovery.
سؤال
The ________________________________________ assembles a disaster recovery team.
سؤال
____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.

A)Cache
B)Server
C)Web site
D)WAN
سؤال
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team.
E)Storage recovery team.
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team.
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
سؤال
Which of the following is not usually an insurable loss?

A)Electrostatic discharge
B)Sever windstorm
C)Fire
D)Lightening
سؤال
List five practices for Web site contingency planning.
سؤال
List six strategies that should be considered for desktop computer and portable systems.
سؤال
List five practices that should be considered when addressing server vulnerabilities.
سؤال
List five contingency strategies that should be considered for LANs.
سؤال
List five contingency strategies to be considered for Web sites.
سؤال
What measures should be considered when determining mainframe contingency requirements?
سؤال
List five strategies that should be considered for distributed systems.
سؤال
List five strategies that should be considered for mainframe systems.
سؤال
What is involved in training for the DR plan?
سؤال
List five contingency strategies that should be considered for servers.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Disaster Recovery: Preparation and Implementation
1
The ____ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.

A)forensic report
B)DR planning document
C)event schedule
D)contingency report
B
2
____ are likely in the event of a hacker attack,when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of their latest conquest.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
A
3
____ may be caused by earthquakes,floods,storm winds,tornadoes,or mud flows.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
C
4
A ____ is owned by a single organization;it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.

A)honeypot
B)cache
C)filter
D)LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.

A)After-action review
B)Hashing
C)Forensics analysis
D)Clustering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.

A)security
B)contingency
C)maintenance
D)cache
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Data from the ____ of major applications and general support systems should be used to determine the recovery requirements and priorities to implement.

A)alert log
B)signature log
C)BIA
D)system log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
In disaster recovery,most triggers are in response to one or more natural events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ considerations for desktop and portable systems should emphasize data availability,confidentiality,and integrity.

A)Forensic
B)Contingency
C)Hashing
D)Black bag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
In disaster recovery,the ____ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.

A)mirrored site
B)hot site
C)cold site
D)trigger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Natural disasters such as earthquakes can usually be mitigated with multipurpose casualty insurance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Before returning to routine duties,the IR team must also conduct a(n)____.

A)chain of custody
B)after-action review
C)war game
D)Alarm Compaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ are those that occur suddenly,with little warning,taking the lives of people and destroying the means of production.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ support file sharing and storage,data processing,central application hosting (such as e-mail or a central database),printing,access control,user authentication,remote access connectivity,and other shared network services.

A)Servers
B)Honeypots
C)Filters
D)Clusters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Once the incident has been contained,and all signs of the incident removed,the ____ phase begins.

A)actions after
B)black bag operation
C)chain of custody
D)blue bag operation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
When selecting an off-site storage location for data backups or stored equipment,extra care should be taken to increase the risk at that storage location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
____ system components are critical to ensure that a failure of a system component,such as a power supply,does not cause a system failure.

A)Redundant
B)Contingency
C)BIA
D)Redundant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match each statement with an item below.

-Works to reestablish functions by repairing or replacing damaged or destroyed components.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
______________________________ is the preparation for and recovery from a disaster,whether natural or man-made.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each statement with an item below.

-The command and control group responsible for all planning and coordination activities.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each statement with an item below.

-This group is expected to quickly assess the recoverability of data from systems on site and then make recommendations to the management team as to whether off-site data recovery is needed.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each statement with an item below.

-Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ systems are implemented in environments in which clients and users are widely dispersed.

A)Security
B)DNS systems
C)Redundant
D)Distributed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match each statement with an item below.

-During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each statement with an item below.

-This group may also interface with the data management group to restore data from backups to their storage areas.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
When developing the LAN contingency plan,the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.

A)events
B)filters
C)single points of failure
D)servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each statement with an item below.

-This group consists of the individuals responsible for providing any needed supplies,space,materials,food,services,or facilities needed at the primary site.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
The disaster response,like incident response,usually begins with a(n)____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.

A)BIA
B)Contingency
C)Maintenance
D)Redundant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Distributed system contingency strategies typically reflect the system's reliance on ____________________ and ____________________ availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ____________________ is a detailed examination of the events that occurred from first detection to final recovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The ________________________________________ assembles a disaster recovery team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.

A)Cache
B)Server
C)Web site
D)WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team.
E)Storage recovery team.
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team.
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is not usually an insurable loss?

A)Electrostatic discharge
B)Sever windstorm
C)Fire
D)Lightening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
List five practices for Web site contingency planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
List six strategies that should be considered for desktop computer and portable systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List five practices that should be considered when addressing server vulnerabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List five contingency strategies that should be considered for LANs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List five contingency strategies to be considered for Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What measures should be considered when determining mainframe contingency requirements?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
List five strategies that should be considered for distributed systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List five strategies that should be considered for mainframe systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is involved in training for the DR plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List five contingency strategies that should be considered for servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.