Deck 7: Disaster Recovery: Preparation and Implementation

Full screen (f)
exit full mode
Question
The ____ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.

A)forensic report
B)DR planning document
C)event schedule
D)contingency report
Use Space or
up arrow
down arrow
to flip the card.
Question
____ are likely in the event of a hacker attack,when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of their latest conquest.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
Question
____ may be caused by earthquakes,floods,storm winds,tornadoes,or mud flows.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
Question
A ____ is owned by a single organization;it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.

A)honeypot
B)cache
C)filter
D)LAN
Question
____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.

A)After-action review
B)Hashing
C)Forensics analysis
D)Clustering
Question
Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.

A)security
B)contingency
C)maintenance
D)cache
Question
____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
Question
Data from the ____ of major applications and general support systems should be used to determine the recovery requirements and priorities to implement.

A)alert log
B)signature log
C)BIA
D)system log
Question
In disaster recovery,most triggers are in response to one or more natural events.
Question
____ considerations for desktop and portable systems should emphasize data availability,confidentiality,and integrity.

A)Forensic
B)Contingency
C)Hashing
D)Black bag
Question
In disaster recovery,the ____ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.

A)mirrored site
B)hot site
C)cold site
D)trigger
Question
The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
Question
Natural disasters such as earthquakes can usually be mitigated with multipurpose casualty insurance.
Question
Before returning to routine duties,the IR team must also conduct a(n)____.

A)chain of custody
B)after-action review
C)war game
D)Alarm Compaction
Question
____ are those that occur suddenly,with little warning,taking the lives of people and destroying the means of production.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
Question
____ support file sharing and storage,data processing,central application hosting (such as e-mail or a central database),printing,access control,user authentication,remote access connectivity,and other shared network services.

A)Servers
B)Honeypots
C)Filters
D)Clusters
Question
Once the incident has been contained,and all signs of the incident removed,the ____ phase begins.

A)actions after
B)black bag operation
C)chain of custody
D)blue bag operation
Question
A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
Question
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
Question
When selecting an off-site storage location for data backups or stored equipment,extra care should be taken to increase the risk at that storage location.
Question
____ system components are critical to ensure that a failure of a system component,such as a power supply,does not cause a system failure.

A)Redundant
B)Contingency
C)BIA
D)Redundant
Question
Match each statement with an item below.

-Works to reestablish functions by repairing or replacing damaged or destroyed components.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
______________________________ is the preparation for and recovery from a disaster,whether natural or man-made.
Question
Match each statement with an item below.

-The command and control group responsible for all planning and coordination activities.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
Match each statement with an item below.

-This group is expected to quickly assess the recoverability of data from systems on site and then make recommendations to the management team as to whether off-site data recovery is needed.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
Match each statement with an item below.

-Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
____ systems are implemented in environments in which clients and users are widely dispersed.

A)Security
B)DNS systems
C)Redundant
D)Distributed
Question
Match each statement with an item below.

-During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
Match each statement with an item below.

-This group may also interface with the data management group to restore data from backups to their storage areas.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
When developing the LAN contingency plan,the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.

A)events
B)filters
C)single points of failure
D)servers
Question
Match each statement with an item below.

-This group consists of the individuals responsible for providing any needed supplies,space,materials,food,services,or facilities needed at the primary site.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
The disaster response,like incident response,usually begins with a(n)____________________.
Question
____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.

A)BIA
B)Contingency
C)Maintenance
D)Redundant
Question
Distributed system contingency strategies typically reflect the system's reliance on ____________________ and ____________________ availability.
Question
The ____________________ is a detailed examination of the events that occurred from first detection to final recovery.
Question
The ________________________________________ assembles a disaster recovery team.
Question
____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.

A)Cache
B)Server
C)Web site
D)WAN
Question
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team.
E)Storage recovery team.
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team.
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Question
Which of the following is not usually an insurable loss?

A)Electrostatic discharge
B)Sever windstorm
C)Fire
D)Lightening
Question
List five practices for Web site contingency planning.
Question
List six strategies that should be considered for desktop computer and portable systems.
Question
List five practices that should be considered when addressing server vulnerabilities.
Question
List five contingency strategies that should be considered for LANs.
Question
List five contingency strategies to be considered for Web sites.
Question
What measures should be considered when determining mainframe contingency requirements?
Question
List five strategies that should be considered for distributed systems.
Question
List five strategies that should be considered for mainframe systems.
Question
What is involved in training for the DR plan?
Question
List five contingency strategies that should be considered for servers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Disaster Recovery: Preparation and Implementation
1
The ____ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.

A)forensic report
B)DR planning document
C)event schedule
D)contingency report
B
2
____ are likely in the event of a hacker attack,when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of their latest conquest.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
A
3
____ may be caused by earthquakes,floods,storm winds,tornadoes,or mud flows.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
C
4
A ____ is owned by a single organization;it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.

A)honeypot
B)cache
C)filter
D)LAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.

A)After-action review
B)Hashing
C)Forensics analysis
D)Clustering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.

A)security
B)contingency
C)maintenance
D)cache
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Data from the ____ of major applications and general support systems should be used to determine the recovery requirements and priorities to implement.

A)alert log
B)signature log
C)BIA
D)system log
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In disaster recovery,most triggers are in response to one or more natural events.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
____ considerations for desktop and portable systems should emphasize data availability,confidentiality,and integrity.

A)Forensic
B)Contingency
C)Hashing
D)Black bag
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
In disaster recovery,the ____ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.

A)mirrored site
B)hot site
C)cold site
D)trigger
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Natural disasters such as earthquakes can usually be mitigated with multipurpose casualty insurance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Before returning to routine duties,the IR team must also conduct a(n)____.

A)chain of custody
B)after-action review
C)war game
D)Alarm Compaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____ are those that occur suddenly,with little warning,taking the lives of people and destroying the means of production.

A)Slow onset disasters
B)Communication disasters
C)Rapid onset disasters
D)Data disasters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ support file sharing and storage,data processing,central application hosting (such as e-mail or a central database),printing,access control,user authentication,remote access connectivity,and other shared network services.

A)Servers
B)Honeypots
C)Filters
D)Clusters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Once the incident has been contained,and all signs of the incident removed,the ____ phase begins.

A)actions after
B)black bag operation
C)chain of custody
D)blue bag operation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.

A)Follow-on incidents
B)War games
C)Black bag operations
D)Blue bag operations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
When selecting an off-site storage location for data backups or stored equipment,extra care should be taken to increase the risk at that storage location.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____ system components are critical to ensure that a failure of a system component,such as a power supply,does not cause a system failure.

A)Redundant
B)Contingency
C)BIA
D)Redundant
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match each statement with an item below.

-Works to reestablish functions by repairing or replacing damaged or destroyed components.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
______________________________ is the preparation for and recovery from a disaster,whether natural or man-made.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each statement with an item below.

-The command and control group responsible for all planning and coordination activities.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match each statement with an item below.

-This group is expected to quickly assess the recoverability of data from systems on site and then make recommendations to the management team as to whether off-site data recovery is needed.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each statement with an item below.

-Based on recommendations by the management team,this group can work from preauthorized purchase orders to quickly order replacement equipment,applications,and services,as the individual teams work to restore recoverable systems.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____ systems are implemented in environments in which clients and users are widely dispersed.

A)Security
B)DNS systems
C)Redundant
D)Distributed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each statement with an item below.

-During this phase,lost or damaged data is restored,systems scrubbed of infection,and essentially everything is restored to its previous state.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each statement with an item below.

-This group may also interface with the data management group to restore data from backups to their storage areas.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
When developing the LAN contingency plan,the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.

A)events
B)filters
C)single points of failure
D)servers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each statement with an item below.

-This group consists of the individuals responsible for providing any needed supplies,space,materials,food,services,or facilities needed at the primary site.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The disaster response,like incident response,usually begins with a(n)____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.

A)BIA
B)Contingency
C)Maintenance
D)Redundant
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Distributed system contingency strategies typically reflect the system's reliance on ____________________ and ____________________ availability.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The ____________________ is a detailed examination of the events that occurred from first detection to final recovery.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The ________________________________________ assembles a disaster recovery team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.

A)Cache
B)Server
C)Web site
D)WAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team.
E)Storage recovery team.
F)Data management team
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each statement with an item below.

-This group works with the remainder of the organization to assist in the recovery of nontechnology functions.

A)Disaster management team
B)Business interface team
C)Actions after
D)Network recovery team
E)Storage recovery team
F)Data management team.
G)Vendor contact team.
H)Logistics team.
I)Business interface team.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is not usually an insurable loss?

A)Electrostatic discharge
B)Sever windstorm
C)Fire
D)Lightening
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
List five practices for Web site contingency planning.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
List six strategies that should be considered for desktop computer and portable systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
List five practices that should be considered when addressing server vulnerabilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List five contingency strategies that should be considered for LANs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List five contingency strategies to be considered for Web sites.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What measures should be considered when determining mainframe contingency requirements?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
List five strategies that should be considered for distributed systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List five strategies that should be considered for mainframe systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is involved in training for the DR plan?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List five contingency strategies that should be considered for servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.