Test Bank For Principles of Incident Response And Disaster Recovery By Michael E. Whitman
TRUE/FALSE
1.For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.
ANS: F PTS: 1 REF: 93
2.Some data is required by law to be retained and stored for years.
ANS: T PTS: 1 REF: 93
3.RAID is an acronym for Redundant Array of Incident-Recovery Drives.
ANS: F PTS: 1 REF: 98
4.One real-time protection and data backup strategy is the use of mirroring.
ANS: T PTS: 1 REF: 102
5.Database shadowing techniques are generally used in organizations that do not need immediate data recovery after an incident or disaster.
ANS: F PTS: 1 REF: 106
MULTIPLE CHOICE
1.____ are used for recovery from disasters that threaten on-site backups.
a.
Data archives
c.
Data backups
b.
Cloud storage sites
d.
Electronic vaulting sites
ANS: A PTS: 1 REF: 93
2.Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and the duration of storage.
a.
replication
c.
incident response
b.
business resumption
d.
retention
ANS: C PTS: 1 REF: 93
3.A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization.
a.
critical
c.
moderate
b.
high
d.
low
ANS: C PTS: 1 REF: 93
4.A(n) ____ is an extension of an organization’s intranet into cloud computing.
a.
private cloud
c.
public cloud
b.
community cloud
d.
application cloud
ANS: A PTS: 1 REF: 94
5.An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.
a.
disk-to-disk-to-tape
c.
RAID
b.
differential
d.
disk-to-disk-to-cloud
ANS: D PTS: 1 REF: 95
6.A(n) ____ backup only archives the files that have been modified since the last backup.
a.
daily
c.
incremental
b.
differential
d.
copy
ANS: C PTS: 1 REF: 96
7.____ uses a number of hard drives to store information across multiple drive units.
a.
Legacy backup
c.
Continuous database protection
b.
RAID
d.
Virtualization
ANS: B PTS: 1 REF: 98
8.RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which data segments are written in turn to each disk drive in the array.
a.
disk mirroring
c.
disk duplexing
b.
disk striping
d.
disk coding
ANS: B PTS: 1 REF: 99
9.Considered to be the traditional “lock and copy” approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive.
a.
continuous database protections
c.
legacy backup applications
b.
online backup applications
d.
RAID Level 1+0 applications
ANS: C PTS: 1 REF: 101
10.Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else’s systems, it is reasonable to ask that the service agreement include contingencies for recovery.
a.
servers
c.
IaaS
b.
PaaS
d.
SaaS
ANS: D PTS: 1 REF: 102
Reviews
There are no reviews yet.