Exam 11: Contingency Planning and Networking Incident Response

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. a.RAID Level 0 f.RAID Level 5 b.RAID Level 1 g.RAID Level 6 c.RAID Level 2 h.RAID Level 7 d.RAID Level 3 i.RAID Level 10 e.RAID Level 4 -Uses byte-level striping of data

(Short Answer)
4.9/5
(34)

Incident ____ is the process of evaluating organizational events, determining which events are possible incidents, also called incident candidates, and then determining whether or not the incident candidate is an actual incident or a nonevent, also called a false positive incident candidate.

(Multiple Choice)
4.8/5
(31)

____________________ are the contractual documents guaranteeing certain minimum levels of service provided by vendors.

(Essay)
4.7/5
(34)

List the four integrated contingency planning (CP) components.

(Essay)
4.8/5
(40)

Match each item with a statement below. a.RAID Level 0 f.RAID Level 5 b.RAID Level 1 g.RAID Level 6 c.RAID Level 2 h.RAID Level 7 d.RAID Level 3 i.RAID Level 10 e.RAID Level 4 -A specialized form of disk striping with parity; is not widely used

(Short Answer)
4.9/5
(34)

Which team is responsible for conducting the BIA?

(Multiple Choice)
4.7/5
(41)

The ____ review entails a detailed examination of the events that occurred from first detection to final recovery.

(Multiple Choice)
4.8/5
(33)

In some organizations, which two plans are considered to be one plan, known as the Business Resumption Plan?

(Multiple Choice)
4.8/5
(32)

____ planning ensures that critical business functions can continue if a disaster occurs.

(Multiple Choice)
4.8/5
(31)

Describe the two criteria that may cause a disaster occurrence.

(Essay)
4.8/5
(32)

A(n) ____ is a detailed description of the activities that occur during an attack, including the preliminary indications of the attack as well as the actions taken and the outcome.

(Multiple Choice)
4.9/5
(40)

Describe the three forms of cloud computing.

(Essay)
4.7/5
(33)

The identification of an incident begins with the ____________________ - that is, the circumstances that cause the IR team to be activated and the IR plan to be initiated.

(Short Answer)
4.7/5
(34)

Compare the protect and forget strategy with the apprehend and prosecute strategy.

(Essay)
4.9/5
(36)

Match each item with a statement below. a.RAID Level 0 f.RAID Level 5 b.RAID Level 1 g.RAID Level 6 c.RAID Level 2 h.RAID Level 7 d.RAID Level 3 i.RAID Level 10 e.RAID Level 4 -A proprietary variation on RAID 5 in which the array works as a single virtual drive

(Short Answer)
4.7/5
(40)

According to D. L. Pipkin, ____ is a definite indicator of an actual incident.

(Multiple Choice)
4.9/5
(40)

Which backup method allows for easy full-system restorations (no shuffling through tapes with partial backups on them)?

(Multiple Choice)
4.8/5
(40)

NAS works well with real-time applications because of the latency of the communication methods.

(True/False)
4.9/5
(30)

Incident response focuses on immediate response to small-scale events.

(True/False)
4.9/5
(45)

____ clustering is a more complex model in which all members of a cluster simultaneously provide application services.

(Multiple Choice)
4.9/5
(26)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)