Deck 13: Business Continuity

ملء الشاشة (f)
exit full mode
سؤال
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?

A)recovery site
B)recovery point
C)single point of failure
D)cascade point of failure
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Multiple sectors on a disk, when combined, are referred to as a:

A)cluster
B)track
C)slice
D)platter
سؤال
Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:

A)symmetric network
B)symmetric server
C)asymmetric network
D)asymmetric server
سؤال
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A)Business continuity planning and testing
B)Disaster planning
C)Business management planning and testing
D)Enterprise disaster planning
سؤال
What kind of data can be lost when a computer is turned off?

A)Volatile
B)Static
C)Non-volatile
D)Persistent
سؤال
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.
سؤال
Most metadata about a file is generated and recorded automatically without the user's knowledge.
سؤال
​What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

A)​RAID 0
B)​RAID 1
C)​RAID 2
D)​RAID 5
سؤال
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
سؤال
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
سؤال
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?

A)Enterprise recovery
B)Disaster recovery
C)Business recovery
D)Emergency recovery
سؤال
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

A)Computer forensics
B)Penetration testing
C)Vulnerability testing
D)Risk management
سؤال
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?

A)65
B)75
C)85
D)95
سؤال
In what type of server cluster can services fail over from downed servers to functional servers?

A)symmetric network
B)asymmetric network
C)symmetric server
D)symmetric network
سؤال
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:

A)service level agreement
B)recovery point objective
C)recovery time objective
D)service point agreement
سؤال
How can an administrator keep devices powered when power is interrupted?

A)uninterruptible power supply
B)redundant power supply
C)uninterruptible system supply
D)replica power supply
سؤال
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

A)system standard
B)system view
C)system image
D)system baseline
سؤال
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

A)bollard
B)mantrap
C)Faraday cage
D)Newton cage
سؤال
What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A)chain of value
B)chain of use
C)chain of property
D)chain of custody
سؤال
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
سؤال
The remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?

A)Disk slack
B)RAM slack
C)ROM slack
D)Edge slack
سؤال
____________________ is data about data.
سؤال
A system that can function for an extended period of time with little downtime is said to have ___________________.​
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Combining two or more servers to appear as one single unit.​
سؤال
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

A)cold site
B)hot site
C)spare site
D)warm site
سؤال
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.​
سؤال
What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?

A)RAM slack
B)Edge slack
C)Drive file slack
D)Sector slack
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The ability of an organization to maintain its operations and services in the face of a disruptive event.​
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The process of identifying threats.
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The ability of a business to continue to function in the even of a disaster.
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.​
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The maximum length of time that an organization can tolerate between backups.​
سؤال
Windows stores files on a hard drive in 512-byte blocks called ____________________.
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Using technology to search for computer evidence of a crime.​
سؤال
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

A)baseline
B)mirror image
C)logical image
D)thin image
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.​
سؤال
RAID 0 technology is based on ____________________.
سؤال
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?

A)Business risk analysis
B)Business alert assessment
C)Business productivity analysis
D)Business impact analysis (BIA)
سؤال
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A metallic enclosure that prevents the entry or escape of an electromagnetic field.​
سؤال
What are the objectives of disaster exercises?
سؤال
Explain how to best capture volatile data.
سؤال
Identify two scenarios that could be used in a BIA.
سؤال
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
سؤال
Discuss the purpose and importance of the chain of custody.
سؤال
Describe the purpose of a disaster recovery plan.
سؤال
When creating a data backup plan or policy, what five basic questions should be answered?​
سؤال
What is required upon completion of an evidence examination?
سؤال
Describe what happens when the response team arrives and secures the crime scene.
سؤال
What are the steps in damage control?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Business Continuity
1
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?

A)recovery site
B)recovery point
C)single point of failure
D)cascade point of failure
C
2
Multiple sectors on a disk, when combined, are referred to as a:

A)cluster
B)track
C)slice
D)platter
A
3
Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:

A)symmetric network
B)symmetric server
C)asymmetric network
D)asymmetric server
D
4
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A)Business continuity planning and testing
B)Disaster planning
C)Business management planning and testing
D)Enterprise disaster planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What kind of data can be lost when a computer is turned off?

A)Volatile
B)Static
C)Non-volatile
D)Persistent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Most metadata about a file is generated and recorded automatically without the user's knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
​What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

A)​RAID 0
B)​RAID 1
C)​RAID 2
D)​RAID 5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?

A)Enterprise recovery
B)Disaster recovery
C)Business recovery
D)Emergency recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

A)Computer forensics
B)Penetration testing
C)Vulnerability testing
D)Risk management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?

A)65
B)75
C)85
D)95
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
In what type of server cluster can services fail over from downed servers to functional servers?

A)symmetric network
B)asymmetric network
C)symmetric server
D)symmetric network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:

A)service level agreement
B)recovery point objective
C)recovery time objective
D)service point agreement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
How can an administrator keep devices powered when power is interrupted?

A)uninterruptible power supply
B)redundant power supply
C)uninterruptible system supply
D)replica power supply
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

A)system standard
B)system view
C)system image
D)system baseline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

A)bollard
B)mantrap
C)Faraday cage
D)Newton cage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A)chain of value
B)chain of use
C)chain of property
D)chain of custody
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
The remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?

A)Disk slack
B)RAM slack
C)ROM slack
D)Edge slack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
____________________ is data about data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
A system that can function for an extended period of time with little downtime is said to have ___________________.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Combining two or more servers to appear as one single unit.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

A)cold site
B)hot site
C)spare site
D)warm site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?

A)RAM slack
B)Edge slack
C)Drive file slack
D)Sector slack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The ability of an organization to maintain its operations and services in the face of a disruptive event.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The process of identifying threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The ability of a business to continue to function in the even of a disaster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The maximum length of time that an organization can tolerate between backups.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Windows stores files on a hard drive in 512-byte blocks called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Using technology to search for computer evidence of a crime.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

A)baseline
B)mirror image
C)logical image
D)thin image
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
RAID 0 technology is based on ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?

A)Business risk analysis
B)Business alert assessment
C)Business productivity analysis
D)Business impact analysis (BIA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A metallic enclosure that prevents the entry or escape of an electromagnetic field.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the objectives of disaster exercises?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Explain how to best capture volatile data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Identify two scenarios that could be used in a BIA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Discuss the purpose and importance of the chain of custody.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe the purpose of a disaster recovery plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
When creating a data backup plan or policy, what five basic questions should be answered?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is required upon completion of an evidence examination?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe what happens when the response team arrives and secures the crime scene.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What are the steps in damage control?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.