Deck 3: Planning for Contingencies

ملء الشاشة (f)
exit full mode
سؤال
An unusual system crash is a possible indicator of an actual incident.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In a warm site,all communications services must be installed after the site is occupied.
سؤال
The presence of hacker tools in a system definitely signals that an incident is in progress or has occurred.
سؤال
Attack success scenarios include alternative outcomes of an attack.
سؤال
In most organizations,the COO is responsible for creating the IRP.
سؤال
A sequential system of activating an alert roster is more accurate than a hierarchical system.
سؤال
An organization should start documenting an incident after the incident has been contained.
سؤال
When an incident takes place,the disaster recovery plan (DRP)is invoked before the incident response plan (IRP).
سؤال
To perform parallel testing,the operations of the business must be halted.
سؤال
Incident recovery should begin after the incident has been contained.
سؤال
Continuous process improvement (CPI)suggests that each time the organization rehearses its plans,it should learn from the process,improve the process,and then rehearse again.
سؤال
The BCP is activated and executed concurrently with the DRP when the disaster is major or long term.
سؤال
A structured walk-through is the simplest kind of validation for reviewing the perceived feasibility and effectiveness of the contingency plan.
سؤال
Computer hardware and peripherals are provided in a cold site.
سؤال
The BCP is most properly managed by the CISO of an organization.
سؤال
A sequential system of activating an alert roster is quicker than a hierarchical system.
سؤال
The business continuity team detects,evaluates,and responds to disasters,and also reestablishes operations at the primary business site.
سؤال
Notification from IDS is a probable indicator of an actual incident.
سؤال
Verifying personnel status is a responsibility of the IR team.
سؤال
Classifying an incident is the responsibility of the IR team.
سؤال
A(n)  champion \text {\underline{ champion} }

is an executive who supports,promotes,and endorses the findings of the CP project._________________________
سؤال
Parallel  \text {\underline{Parallel } }
testing is the most rigorous strategy for testing contingency plans._________________________
سؤال
A(n)attack scenario  \text {\underline{scenario } }

consists of a detailed description of the activities that usually occur during an attack._________________________
سؤال
A(n) structured walk-through  \text {\underline{structured walk-through } }

is a method of testing contingency plans in which each involved person works individually to simulate the performance of each task that he or she is responsible for._________________________
سؤال
A(n) hierarchical  \text {\underline{hierarchical } }
roster requires that a contact person call each and every person on the roster._________________________
سؤال
The BIA planning team estimates the cost of the best,worst,and most likely outcomes of an attack by preparing a(n)  attack scenario end case  \text {\underline{ attack scenario end case } }

_________________________
سؤال
The  disaster recovery \text {\underline{ disaster recovery} }

team is responsible for detecting,evaluating,and responding to disasters,and reestablishing operations at the primary business site._________________________
سؤال
A(n)  alert message \text {\underline{ alert message} }

is a scripted set of initial instructions used to respond to an incident._________________________
سؤال
The  IR Plan  \text {\underline{ IR Plan } }

is the component of contingency planning that focuses on restoring operations at the primary site._________________________
سؤال
The concept that iteration results in improvement is implemented in the methodology of  continuous process improvement (CPI) \text {\underline{ continuous process improvement (CPI)} }

._________________________
سؤال
The CP  \text {\underline{CP } }

team manages and executes the incident response plan by detecting,evaluating,and responding to incidents._________________________
سؤال
In contingency planning,an unexpected,negative occurrence is called a(n) event.  \text {\underline{event. } }

._________________________
سؤال
Changes to logs are probable  \text {\underline{probable } }

indicators of an actual incident._________________________
سؤال
The  business impact analysis \text {\underline{ business impact analysis} }

provides the CP team with information about systems and the threats they face._________________________
سؤال
Rapid-onset  \text {\underline{Rapid-onset } }

disasters occur suddenly,and may take the lives of people and destroy the means of production._________________________
سؤال
Activities at unexpected times are  probable \text {\underline{ probable} }

indicators of an actual incident._________________________
سؤال
Electronic vaulting  \text {\underline{Electronic vaulting } }

involves the transfer of live transactions to an off-site facility._________________________
سؤال
The process of examining a possible incident and determining whether it constitutes an actual incident is called incident  verification \text {\underline{ verification} }
._________________________
سؤال
Crisis  \text {\underline{Crisis } }

management entails a set of focused steps that deal primarily with the people involved in a disaster._________________________
سؤال
The presence of unfamiliar files is a(n)  definite \text {\underline{ definite} }

indicator of an actual incident._________________________
سؤال
A scripted set of instructions about an incident is known as a(n)____.

A) incident report
B) incident summary
C) alert roster
D) alert message
سؤال
The three categories of incident indicators identified by D.L.Pipkin are possible,probable,and ____.

A) likely
B) improbable
C) definite
D) unlikely
سؤال
Operations at the primary business site are reestablished by the ____ team.

A) business continuity
B) CP
C) incident response
D) disaster recovery
سؤال
The ____ plan enables the business to continue to function at an alternate site.

A) FR
B) BC
C) IR
D) DR
سؤال
The IR Plan is usually activated ____.

A) before an incident takes place
B) when an incident is detected
C) once the DRP is activated
D) once the BCP is activated
سؤال
Which of the following is a possible indicator of an actual incident?

A) Unusual consumption of computing resources
B) Activities at unexpected times
C) Presence of hacker tools
D) Reported attacks
سؤال
A document that contains contact information on the individuals to be notified in the event of an actual incident is called a(n)____.

A) notification table
B) alert roster
C) notification list
D) response list
سؤال
Determining whether a possible incident is an actual incident is the responsibility of the ____ team.

A) CP
B) BC
C) DR
D) IR
سؤال
In a ____ activation,a single person calls all the people on the roster.

A) sequential
B) linear
C) random
D) hierarchical
سؤال
____ is the process of examining a possible incident and determining whether it constitutes an actual incident.

A) Incident classification
B) Incident identification
C) Incident registration
D) Incident verification
سؤال
In CP,an unexpected event is called a(n)____.

A) disaster
B) occurrence
C) episode
D) incident
سؤال
The ____ plan focuses on restoring operations at the primary site.

A) DR
B) IR
C) FR
D) BC
سؤال
In the event of an incident or disaster,the ____ team sets up and starts off-site operations.

A) CP
B) business continuity
C) disaster recovery
D) incident response
سؤال
The ____ plan focuses on the immediate response to an incident.

A) DR
B) IR
C) BC
D) FR
سؤال
Which of the following is a probable indicator of an actual incident?

A) Presence of unfamiliar files
B) Unusual system crashes
C) Presence of new accounts
D) Presence or execution of unknown programs
سؤال
Which of the following is a definite indicator of an actual incident?

A) Unusual system crashes
B) Reported attack
C) Presence of new accounts
D) Use of dormant accounts
سؤال
A ____ activation requires that the first person call designated people on the roster,who in turn call other designated people,and so on.

A) hierarchical
B) sequential
C) serial
D) random
سؤال
The two ways to activate an alert roster are sequentially and ____.

A) exponentially
B) dynamically
C) randomly
D) hierarchically
سؤال
The responsibility for creating an organization's IR Plan usually falls to the ____.

A) CIO
B) network administrators
C) security managers
D) CISO
سؤال
The ____ team collects information about information systems and the threats they face,and creates the contingency plans for incident response,disaster recovery,and business continuity.

A) incident response
B) CP
C) disaster recovery
D) business continuity
سؤال
The BC Plan is most properly managed by the ____.

A) CEO
B) CIO
C) CISO
D) IT community of interest
سؤال
____ ensures that critical business functions can continue if a disaster occurs.

A) Business continuity planning
B) Incident response planning
C) Disaster recovery planning
D) Crisis management planning
سؤال
A(n)____ determines the extent of the breach of confidentiality,integrity,and availability of information and information assets.

A) incident report
B) incident damage assessment
C) information loss assessment
D) damage report
سؤال
The DRP is usually managed by the ____.

A) CEO
B) COO
C) CISO
D) IT community of interest
سؤال
Which of the following is an example of a rapid-onset disaster?

A) Flood
B) Pest infestation
C) Famine
D) Environmental degradation
سؤال
Organizations located in coastal areas are more likely to experience ____ than organizations in other cities.

A) fires
B) earthquakes
C) tsunamis
D) cyberterrorism
سؤال
Dust contamination can ____.

A) damage the building that houses the information systems
B) shorten the lives of information systems
C) cause fires or other disasters
D) disrupt access to the building that houses the information systems
سؤال
Crisis management is designed to deal primarily with ____.

A) computer systems
B) network devices
C) network data
D) people
سؤال
Which of the following is an example of a slow-onset disaster?

A) Earthquake
B) Tornado
C) Mud flow
D) Pest infestation
سؤال
A ____ is a fully configured computer facility that needs only the latest data backups and the personnel to function.

A) hot site
B) warm site
C) cold site
D) service bureau
سؤال
A warm site ____.

A) includes software applications
B) includes computer equipment
C) can be fully functional within minutes
D) costs more than a hot site
سؤال
When a disaster threatens the viability of an organization at the primary site,the ____ is started.

A) crisis management process
B) business continuity process
C) incident response process
D) disaster recovery process
سؤال
Which of the following is a responsibility of the crisis management team?

A) Restoring the data from backups
B) Evaluating monitoring capabilities
C) Activating the alert roster
D) Restoring the services and processes in use
سؤال
A(n)____ entails a detailed examination of the events that occurred from first detection to final recovery.

A) alert message
B) alert roster
C) after-action review
D) incident damage assessment
سؤال
When dealing with an incident,the last action the IR team takes is to ____.

A) create the incident damage assessment
B) conduct an after-action review
C) restore data from backups
D) restore services and processes in use
سؤال
Which of the following is true about a hot site?

A) It is an empty room with standard heating, air conditioning, and electrical service.
B) It includes computing equipment and peripherals with servers but not client workstations.
C) It duplicates computing resources, peripherals, phone systems, applications, and workstations.
D) All communications services must be installed after the site is occupied.
سؤال
As part of DR plan readiness,each employee should have two types of ____ information cards in his or her possession at all times.

A) emergency
B) medical
C) insurance
D) lottery
سؤال
Which of the following can be fully functional within minutes?

A) A warm site
B) A hot site
C) A cold site
D) All of these
سؤال
No computer hardware or peripherals are provided in a ____.

A) cold site
B) warm site
C) timeshare
D) hot site
سؤال
Which of the following is a part of the incident recovery process?

A) Identifying the vulnerabilities that allowed the incident to occur and spread
B) Determining the event's impact on normal business operations and, if necessary, making a disaster declaration
C) Supporting personnel and their loved ones during the crisis
D) Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/114
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Planning for Contingencies
1
An unusual system crash is a possible indicator of an actual incident.
True
2
In a warm site,all communications services must be installed after the site is occupied.
False
3
The presence of hacker tools in a system definitely signals that an incident is in progress or has occurred.
True
4
Attack success scenarios include alternative outcomes of an attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
5
In most organizations,the COO is responsible for creating the IRP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
6
A sequential system of activating an alert roster is more accurate than a hierarchical system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
7
An organization should start documenting an incident after the incident has been contained.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
8
When an incident takes place,the disaster recovery plan (DRP)is invoked before the incident response plan (IRP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
9
To perform parallel testing,the operations of the business must be halted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
10
Incident recovery should begin after the incident has been contained.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
11
Continuous process improvement (CPI)suggests that each time the organization rehearses its plans,it should learn from the process,improve the process,and then rehearse again.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
12
The BCP is activated and executed concurrently with the DRP when the disaster is major or long term.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
13
A structured walk-through is the simplest kind of validation for reviewing the perceived feasibility and effectiveness of the contingency plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
14
Computer hardware and peripherals are provided in a cold site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
15
The BCP is most properly managed by the CISO of an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
16
A sequential system of activating an alert roster is quicker than a hierarchical system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
17
The business continuity team detects,evaluates,and responds to disasters,and also reestablishes operations at the primary business site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
18
Notification from IDS is a probable indicator of an actual incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
19
Verifying personnel status is a responsibility of the IR team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
20
Classifying an incident is the responsibility of the IR team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)  champion \text {\underline{ champion} }

is an executive who supports,promotes,and endorses the findings of the CP project._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
22
Parallel  \text {\underline{Parallel } }
testing is the most rigorous strategy for testing contingency plans._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n)attack scenario  \text {\underline{scenario } }

consists of a detailed description of the activities that usually occur during an attack._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n) structured walk-through  \text {\underline{structured walk-through } }

is a method of testing contingency plans in which each involved person works individually to simulate the performance of each task that he or she is responsible for._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) hierarchical  \text {\underline{hierarchical } }
roster requires that a contact person call each and every person on the roster._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
26
The BIA planning team estimates the cost of the best,worst,and most likely outcomes of an attack by preparing a(n)  attack scenario end case  \text {\underline{ attack scenario end case } }

_________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
27
The  disaster recovery \text {\underline{ disaster recovery} }

team is responsible for detecting,evaluating,and responding to disasters,and reestablishing operations at the primary business site._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n)  alert message \text {\underline{ alert message} }

is a scripted set of initial instructions used to respond to an incident._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
29
The  IR Plan  \text {\underline{ IR Plan } }

is the component of contingency planning that focuses on restoring operations at the primary site._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
30
The concept that iteration results in improvement is implemented in the methodology of  continuous process improvement (CPI) \text {\underline{ continuous process improvement (CPI)} }

._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
31
The CP  \text {\underline{CP } }

team manages and executes the incident response plan by detecting,evaluating,and responding to incidents._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
32
In contingency planning,an unexpected,negative occurrence is called a(n) event.  \text {\underline{event. } }

._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
33
Changes to logs are probable  \text {\underline{probable } }

indicators of an actual incident._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
34
The  business impact analysis \text {\underline{ business impact analysis} }

provides the CP team with information about systems and the threats they face._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
35
Rapid-onset  \text {\underline{Rapid-onset } }

disasters occur suddenly,and may take the lives of people and destroy the means of production._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
36
Activities at unexpected times are  probable \text {\underline{ probable} }

indicators of an actual incident._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
37
Electronic vaulting  \text {\underline{Electronic vaulting } }

involves the transfer of live transactions to an off-site facility._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
38
The process of examining a possible incident and determining whether it constitutes an actual incident is called incident  verification \text {\underline{ verification} }
._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
39
Crisis  \text {\underline{Crisis } }

management entails a set of focused steps that deal primarily with the people involved in a disaster._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
40
The presence of unfamiliar files is a(n)  definite \text {\underline{ definite} }

indicator of an actual incident._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
41
A scripted set of instructions about an incident is known as a(n)____.

A) incident report
B) incident summary
C) alert roster
D) alert message
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
42
The three categories of incident indicators identified by D.L.Pipkin are possible,probable,and ____.

A) likely
B) improbable
C) definite
D) unlikely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
43
Operations at the primary business site are reestablished by the ____ team.

A) business continuity
B) CP
C) incident response
D) disaster recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ____ plan enables the business to continue to function at an alternate site.

A) FR
B) BC
C) IR
D) DR
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
45
The IR Plan is usually activated ____.

A) before an incident takes place
B) when an incident is detected
C) once the DRP is activated
D) once the BCP is activated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is a possible indicator of an actual incident?

A) Unusual consumption of computing resources
B) Activities at unexpected times
C) Presence of hacker tools
D) Reported attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
47
A document that contains contact information on the individuals to be notified in the event of an actual incident is called a(n)____.

A) notification table
B) alert roster
C) notification list
D) response list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
48
Determining whether a possible incident is an actual incident is the responsibility of the ____ team.

A) CP
B) BC
C) DR
D) IR
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
49
In a ____ activation,a single person calls all the people on the roster.

A) sequential
B) linear
C) random
D) hierarchical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
50
____ is the process of examining a possible incident and determining whether it constitutes an actual incident.

A) Incident classification
B) Incident identification
C) Incident registration
D) Incident verification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
51
In CP,an unexpected event is called a(n)____.

A) disaster
B) occurrence
C) episode
D) incident
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
52
The ____ plan focuses on restoring operations at the primary site.

A) DR
B) IR
C) FR
D) BC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
53
In the event of an incident or disaster,the ____ team sets up and starts off-site operations.

A) CP
B) business continuity
C) disaster recovery
D) incident response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
54
The ____ plan focuses on the immediate response to an incident.

A) DR
B) IR
C) BC
D) FR
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is a probable indicator of an actual incident?

A) Presence of unfamiliar files
B) Unusual system crashes
C) Presence of new accounts
D) Presence or execution of unknown programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following is a definite indicator of an actual incident?

A) Unusual system crashes
B) Reported attack
C) Presence of new accounts
D) Use of dormant accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
57
A ____ activation requires that the first person call designated people on the roster,who in turn call other designated people,and so on.

A) hierarchical
B) sequential
C) serial
D) random
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
58
The two ways to activate an alert roster are sequentially and ____.

A) exponentially
B) dynamically
C) randomly
D) hierarchically
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
59
The responsibility for creating an organization's IR Plan usually falls to the ____.

A) CIO
B) network administrators
C) security managers
D) CISO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
60
The ____ team collects information about information systems and the threats they face,and creates the contingency plans for incident response,disaster recovery,and business continuity.

A) incident response
B) CP
C) disaster recovery
D) business continuity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
61
The BC Plan is most properly managed by the ____.

A) CEO
B) CIO
C) CISO
D) IT community of interest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
62
____ ensures that critical business functions can continue if a disaster occurs.

A) Business continuity planning
B) Incident response planning
C) Disaster recovery planning
D) Crisis management planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
63
A(n)____ determines the extent of the breach of confidentiality,integrity,and availability of information and information assets.

A) incident report
B) incident damage assessment
C) information loss assessment
D) damage report
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
64
The DRP is usually managed by the ____.

A) CEO
B) COO
C) CISO
D) IT community of interest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following is an example of a rapid-onset disaster?

A) Flood
B) Pest infestation
C) Famine
D) Environmental degradation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
66
Organizations located in coastal areas are more likely to experience ____ than organizations in other cities.

A) fires
B) earthquakes
C) tsunamis
D) cyberterrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
67
Dust contamination can ____.

A) damage the building that houses the information systems
B) shorten the lives of information systems
C) cause fires or other disasters
D) disrupt access to the building that houses the information systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
68
Crisis management is designed to deal primarily with ____.

A) computer systems
B) network devices
C) network data
D) people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is an example of a slow-onset disaster?

A) Earthquake
B) Tornado
C) Mud flow
D) Pest infestation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
70
A ____ is a fully configured computer facility that needs only the latest data backups and the personnel to function.

A) hot site
B) warm site
C) cold site
D) service bureau
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
71
A warm site ____.

A) includes software applications
B) includes computer equipment
C) can be fully functional within minutes
D) costs more than a hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
72
When a disaster threatens the viability of an organization at the primary site,the ____ is started.

A) crisis management process
B) business continuity process
C) incident response process
D) disaster recovery process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is a responsibility of the crisis management team?

A) Restoring the data from backups
B) Evaluating monitoring capabilities
C) Activating the alert roster
D) Restoring the services and processes in use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
74
A(n)____ entails a detailed examination of the events that occurred from first detection to final recovery.

A) alert message
B) alert roster
C) after-action review
D) incident damage assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
75
When dealing with an incident,the last action the IR team takes is to ____.

A) create the incident damage assessment
B) conduct an after-action review
C) restore data from backups
D) restore services and processes in use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
76
Which of the following is true about a hot site?

A) It is an empty room with standard heating, air conditioning, and electrical service.
B) It includes computing equipment and peripherals with servers but not client workstations.
C) It duplicates computing resources, peripherals, phone systems, applications, and workstations.
D) All communications services must be installed after the site is occupied.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
77
As part of DR plan readiness,each employee should have two types of ____ information cards in his or her possession at all times.

A) emergency
B) medical
C) insurance
D) lottery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following can be fully functional within minutes?

A) A warm site
B) A hot site
C) A cold site
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
79
No computer hardware or peripherals are provided in a ____.

A) cold site
B) warm site
C) timeshare
D) hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following is a part of the incident recovery process?

A) Identifying the vulnerabilities that allowed the incident to occur and spread
B) Determining the event's impact on normal business operations and, if necessary, making a disaster declaration
C) Supporting personnel and their loved ones during the crisis
D) Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 114 في هذه المجموعة.