Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?
XYZ Inc. has set up an FTP server between its primary site of business and its backup site. Jennifer, the IT administrator, is charged with transferring all the critical data to the backup site via this FTP server. Which of the following terms best describes the process?
Which of the following terms refers to the ability to restore data and applications that run businesses should their data centers, servers, or other infrastructure get damaged or destroyed due to a disaster?
In which scenario training phase is a debrief conducted with the participants to obtain more feedback?
Jason is a system administrator in an organization that operates virtual machines. While going through the testing process, he noticed that the speed of transmission of data between the virtual machines was slow. This issue may have occurred due to poor Virtual Machine Queuing (VMQ) handling, as a result of Network Interface Card (NIC) restrictions on the physical machines. What should Jason do to remedy this issue?
ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?
Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?
Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?
John wanted to transfer his organization’s data to an alternate site. He wanted the alternate site to run in parallel to the primary site, which would allow his organization to continue normal business operations almost immediately in the event of a disruption. Which of the following sites is best suited to John’s requirements?
The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?
Katie was setting up disaster recovery teams in her organization to combat any disaster that occurred. One of the most important teams was the disaster recovery coordinator. Having two names in mind for the post, Katie interviewed the two people for the roles and responsibilities of the disaster recovery coordinator. Which of the following statements should either of the interviewees use to get the post?
Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:
Very High
High
Medium
Low
Very LowWhich assessment method did Jonathan use to perform the risk assessment?
Oliver’s team had been working hard on a proposal for a new project. After meticulously working out the details for a month, they found out that someone had leaked their proposal to their competitor and they had lost the project. This impacted their morale hugely, and for the next two months, all the other projects progressed extremely slowly resulting in their delay. Which of the following best describes the impact that this data breach had on the organization?
Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?
Which of the following terms refers to the potential gain from the best alternative forgone when a choice needs to be made between several mutually exclusive alternatives?
Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?
Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?
James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?
Jack is a system administrator working in a data center, which operates thousands of virtual servers running on Microsoft’s virtualization platform, Hyper-V. Jack’s manager advises him to take a snapshot backup instead of a full backup of the virtual machines running on Hyper-V to save the backup time. Which native feature present in Hyper-V Manager should he use in this scenario?
Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?
Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?
To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?
Which of the following terms refers to the backing up of files that have been modified, changed, or have been added since the last full backup?
Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?
Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?
Which of the following terms defines the assessment of the risk factors and the relationship that exists between these factors?
Which of the following terms refers to a storage system that consists of hard disk drives (HDDs) that look and act like a physical tape library?
Which of the following terms refers to the process of determining the potential impact of disruptive events on an organization’s business processes?
Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?
Which of the following is also known as the doomsday recovery level in 3DR?
Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?
James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?
Which of the following options must be considered by an organization when conducting BIA?
Jake was preparing a particular plan for his organization in which all personnel accountable for research, development, and implementation of the disaster recovery plan were being identified. Which plan was Jake preparing for his organization?
Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?
Emma was conducting scenario training in her organization. In the training phase that was currently being conducted, the participants were well informed in advance about the training taking place. Which training phase was currently being conducted?
Which of the following terms refers to a backup that is taken when the database is offline?
Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?
Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?
Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?