ISOL 632 – Business Continuity Planning and Disaster Recovery Planning quiz 2

User Generated

cenouhx123

Computer Science

ISOL 632

University of the Cumberlands

Description

  • In database replication, the _____________ process involves using a master database for normal operations while periodically copying new or updating entries to a backup source.

a.

Snapshot replication

b.

Transferral replication

c.

Merger replication

d.

Transaction replication

0.10000 points

QUESTION 2

  • A (n) ____________________ strategy focuses on backing up multiple copies of databases for recovery purposes, whereas other solutions offers instantaneous availability of dynamic redundant data.

0.10000 points

QUESTION 3

  • A(n) __________________________ defines the expectations and necessary capabilities that are required at an organization’s alternative site.

0.10000 points

QUESTION 4

  • Server recovery advancements have brought forth a(n) ______________ technology that is designed to replace operating systems and services whenever they fail.

0.10000 points

QUESTION 5

  • Forensic analysis is a systematic process to examine information assets for historical evidentiary material that can provide insight into how an incident transpired.

True

False

0.10000 points

QUESTION 6

  • A(n) _______________ comprises of two or more independent zones that safeguards an organization against the loss of data or multiple disk failure.

a.

disaster resistant disk systems

b.

failure tolerant disk systems

c.

failure resistant disk systems

d.

disaster tolerant disk systems

0.10000 points

QUESTION 7

  • When an organization trains its CSIRT on its IR plan, a(n) _________________ enables the individual team member to perform expected and required task by completing those duties without interfering with the businesses operation.

0.10000 points

QUESTION 8

  • Incident response processes attempt to contain and resolve identifiable incidents aligned to the incident response plan; whereas, the overall incident process is inclusive of preparation, detection, analysis, containment, eradication, recovery, and all other post-incident activities.

True

False

0.10000 points

QUESTION 9

  • An organization’s business resumption plan describes and lists all of the necessary efforts and critical components that are required to resume workforce assignment and normal operation at its primary business location.

True

False

0.10000 points

QUESTION 10

  • A(n) ________________ stores files that have been added or modified since the organization’s last full backup.

a.

incremental backup

b.

differential backup

c.

copy backup

d.

daily backup

0.10000 points

QUESTION 11

  • A(n) __________________ necessitates less time and space because this method archives all modified files since the organization’s last backup.

a.

incremental backup

b.

differential backup

c.

daily backup

d.

copy backup

0.10000 points

QUESTION 12

  • A(n) _____________________ is a replaceable unit monitoring and failure indicator that protects against data loss due or system failure.

a.

failure resistant disk systems

b.

disaster resistant disk systems

c.

disaster tolerant disk systems

d.

failure tolerant disk systems

0.10000 points

QUESTION 13

  • Operating systems initiates processes that creates records of the behavior of an object once the journaling function is abled; these records are then recorded as entries and are stored in the journal’s receiver.

True

False

0.10000 points

QUESTION 14

  • A (n) _______________________ approach enhances the compatibility and portability of computing resources because it acknowledges all API calls initiated by the application.

a.

Operating system-level virtualization

b.

Application-level virtualization

c.

Hardware-level virtualization

d.

Virtual cloud-level virtualization

0.10000 points

QUESTION 15

  • Incident response procedures are _____________________ that excludes any efforts taken to preate for such actions because they are not considered part of preventive control.

0.10000 points

QUESTION 16

  • When training the CSIRT team on the IR plan, a(n) ________________ testing involves allowing the team members to follow every process within the plan, to include taking the organization’s system down, performing data restoration from a backup, and conducting notifications.

0.10000 points

QUESTION 17

  • Hosted by a third party source, a(n) _______________ enable multiple organizations with mutual interests to share computing and application resources.

0.10000 points

QUESTION 18

  • When training the CSIRT team on the IR plan, a(n) ________________ approach is favored, as it allows information security staff to use realistic networks and information systems to simulate attacks.

0.10000 points

QUESTION 19

  • Hot, warm, and cold sites are timeshare options that are secured by service agreements with business partners to enable an organization to have viable disaster recovery and business continuity options at a reduced cost.

True

False

0.10000 points

QUESTION 20

  • A (n) _______________________ protects against data access loss caused by cache, device channel, power supply, and controller module failures.

a.

disaster resistant disk systems

b.

disaster tolerant disk systems

c.

failure tolerant disk systems

d.

failure resistant disk systems

0.10000 points

QUESTION 21

  • In database replication, the ______________________ process involves merging data from multiple dateabases into segmented source.

a.

Transferral replication

b.

Merger replication

c.

Transaction replication

d.

Snapshot replication

0.10000 points

QUESTION 22

  • When an organization trains its CSIRT on its IR plan, the ___________________ training approach mimics the full performance and expectations for each task and its components within the plan, but it is short of conducting an actual physical session.

0.10000 points

QUESTION 23

  • A mirrored site is the most desirable hot site option because it uses either periodic or live data transfer of identically backed up information from an organizations critical resources that are utilized at its primary site.

True

False

0.10000 points

QUESTION 24

  • Preventative measures prepared by the Incident Response team to effectively manage risks that are associated with specific attacks are a part of the ________________________ planning process.

0.10000 points

QUESTION 25

  • In database replication, the _________________ process involves copying data from one database to another source.

a.

Merger replication

b.

Snapshot replication

c.

Transaction replication

d.

Transferral replication

0.10000 points

QUESTION 26

  • RAID Level 5+1 stripes data across multiple drives without a need for a dedicated parity drive and allows replacements taking the system completely down.

True

False

0.10000 points

QUESTION 27

  • A(n) _______________________ approach is a physical host resource that is divided between the host itself and virtual machines which enables virtual machines to act as independent operating systems.

a.

Hardware-level virtualization

b.

Virtual cloud-level virtualization

c.

Operating system-level virtualization

d.

Application-level virtualization

0.10000 points

QUESTION 28

  • A(n) _______________ method increase resource utilization controls because it extends multiple OS virtual sessions that permits applications to operate independently of each other.

a.

Operating system-level virtualization

b.

Virtual cloud-level virtualization

c.

Application-level virtualization

d.

Hardware-level virtualization

0.10000 points

QUESTION 29

  • A(n) ___________________ replicates specific file subsets regardless if the files were identified or modified.

a.

incremental backup

b.

copy backup

c.

daily backup

d.

differential backup

0.10000 points

QUESTION 30

  • The DR plan and the BC plan both may need to be activated to address large-scale distributed denial-of-service attacks.

True

False

0.10000 points

Unformatted Attachment Preview

1. In database replication, the _____________ process involves using a master database for normal operations while periodically copying new or updating entries to a backup source. a. Snapshot replication b. Transferral replication c. Merger replication d. Transaction replication 0.10000 points 1. QUESTION 2 A (n) ____________________ strategy focuses on backing up multiple copies of databases for recovery purposes, whereas other solutions offers instantaneous availability of dynamic redundant data. 0.10000 points 1. QUESTION 3 A(n) __________________________ defines the expectations and necessary capabilities that are required at an organization’s alternative site. 0.10000 points 1. QUESTION 4 Server recovery advancements have brought forth a(n) ______________ technology that is designed to replace operating systems and services whenever they fail. 0.10000 points 1. QUESTION 5 Forensic analysis is a systematic process to examine information assets for historical evidentiary material that can provide insight into how an incident transpired. True False 0.10000 points 1. QUESTION 6 A(n) _______________ comprises of two or more independent zones that safeguards an organization against the loss of data or multiple disk failure. a. disaster resistant disk systems b. failure tolerant disk systems c. failure resistant disk systems d. disaster tolerant disk systems 0.10000 points 1. QUESTION 7 When an organization trains its CSIRT on its IR plan, a(n) _________________ enables the individual team member to perform expected and required task by completing those duties without interfering with the businesses operation. 0.10000 points 1. QUESTION 8 Incident response processes attempt to contain and resolve identifiable incidents aligned to the incident response plan; whereas, the overall incident process is inclusive of preparation, detection, analysis, containment, eradication, recovery, and all other post-incident activities. True False 0.10000 points QUESTION 9 1. An organization’s business resumption plan describes and lists all of the necessary efforts and critical components that are required to resume workforce assignment and normal operation at its primary business location. True False 0.10000 points 1. QUESTION 10 A(n) ________________ stores files that have been added or modified since the organization’s last full backup. a. incremental backup b. differential backup c. copy backup d. daily backup 0.10000 points 1. QUESTION 11 A(n) __________________ necessitates less time and space because this method archives all modified files since the organization’s last backup. a. incremental backup b. differential backup c. daily backup d. copy backup 0.10000 points 1. QUESTION 12 A(n) _____________________ is a replaceable unit monitoring and failure indicator that protects against data loss due or system failure. a. failure resistant disk systems b. disaster resistant disk systems c. disaster tolerant disk systems d. failure tolerant disk systems 0.10000 points QUESTION 13 1. Operating systems initiates processes that creates records of the behavior of an object once the journaling function is abled; these records are then recorded as entries and are stored in the journal’s receiver. True False 0.10000 points QUESTION 14 1. A (n) _______________________ approach enhances the compatibility and portability of computing resources because it acknowledges all API calls initiated by the application. a. Operating system-level virtualization b. Application-level virtualization c. Hardware-level virtualization d. Virtual cloud-level virtualization 0.10000 points 1. QUESTION 15 Incident response procedures are _____________________ that excludes any efforts taken to preate for such actions because they are not considered part of preventive control. 0.10000 points 1. QUESTION 16 When training the CSIRT team on the IR plan, a(n) ________________ testing involves allowing the team members to follow every process within the plan, to include taking the organization’s system down, performing data restoration from a backup, and conducting notifications. 0.10000 points 1. QUESTION 17 Hosted by a third party source, a(n) _______________ enable multiple organizations with mutual interests to share computing and application resources. 0.10000 points 1. QUESTION 18 When training the CSIRT team on the IR plan, a(n) ________________ approach is favored, as it allows information security staff to use realistic networks and information systems to simulate attacks. 0.10000 points 1. QUESTION 19 Hot, warm, and cold sites are timeshare options that are secured by service agreements with business partners to enable an organization to have viable disaster recovery and business continuity options at a reduced cost. True False 0.10000 points 1. QUESTION 20 A (n) _______________________ protects against data access loss caused by cache, device channel, power supply, and controller module failures. a. disaster resistant disk systems b. disaster tolerant disk systems c. failure tolerant disk systems d. failure resistant disk systems 0.10000 points 1. QUESTION 21 In database replication, the ______________________ process involves merging data from multiple dateabases into segmented source. a. Transferral replication b. Merger replication c. Transaction replication d. Snapshot replication 0.10000 points 1. QUESTION 22 When an organization trains its CSIRT on its IR plan, the ___________________ training approach mimics the full performance and expectations for each task and its components within the plan, but it is short of conducting an actual physical session. 0.10000 points 1. QUESTION 23 A mirrored site is the most desirable hot site option because it uses either periodic or live data transfer of identically backed up information from an organizations critical resources that are utilized at its primary site. True False 0.10000 points 1. QUESTION 24 Preventative measures prepared by the Incident Response team to effectively manage risks that are associated with specific attacks are a part of the ________________________ planning process. 0.10000 points 1. QUESTION 25 In database replication, the _________________ process involves copying data from one database to another source. a. Merger replication b. Snapshot replication c. Transaction replication d. Transferral replication 0.10000 points 1. QUESTION 26 RAID Level 5+1 stripes data across multiple drives without a need for a dedicated parity drive and allows replacements taking the system completely down. True False 0.10000 points 1. QUESTION 27 A(n) _______________________ approach is a physical host resource that is divided between the host itself and virtual machines which enables virtual machines to act as independent operating systems. a. Hardware-level virtualization b. Virtual cloud-level virtualization c. Operating system-level virtualization d. Application-level virtualization 0.10000 points 1. QUESTION 28 A(n) _______________ method increase resource utilization controls because it extends multiple OS virtual sessions that permits applications to operate independently of each other. a. Operating system-level virtualization b. Virtual cloud-level virtualization c. Application-level virtualization d. Hardware-level virtualization 0.10000 points 1. QUESTION 29 A(n) ___________________ replicates specific file subsets regardless if the files were identified or modified. a. incremental backup b. copy backup c. daily backup d. differential backup 0.10000 points 1. QUESTION 30 The DR plan and the BC plan both may need to be activated to address large-scale distributed denial-ofservice attacks. True False 0.10000 points
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1.

1.

In database replication, the ____ Transaction replication_________ process involves using a master
database for normal operations while periodically copying new or updating entries to a backup source.
a. Snapshot replication
b. Transferral replication
c. Merger replication
d. Transaction replication
0.10000 points

QUESTION 2
A (n) __________ optimal backup __________ strategy focuses on backing up multiple copies of
databases for recovery purposes, whereas other solutions offers instantaneous availability of dynamic
redundant data.
0.10000 points

QUESTION 3
1.

A(n) ________ Memorandum of agreement(MOA) or service-level agreement
(SLA) __________________ defines the expectations and necessary capabilities that are required at an
organization’s alternative site.
0.10000 points

QUESTION 4
1.

Server recovery advancements have brought forth a(n) ______ bare metal recovery________
technology that is designed to replace operating systems and services whenever they fail.
0.10000 points

1.

QUESTION 5
Forensic analysis is a systematic process to examine information assets for historical evidentiary material
that can provide insight into how an incident transpired.
True
0.10000 points

1.

QUESTION 6

A(n) ____ disaster tolerant disk systems ___________ comprises of two or more independent zones that
safeguards an organization against the loss of data or multiple disk failure.
a. disaster resistant disk systems
b. failure tolerant disk systems
c. failure resistant disk systems
d. disaster tolerant disk systems
0.10000 points

1.

QUESTION 7
When an organization trains its CSIRT on its IR plan, a(n) ___Parallel Testing_____ en...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags