Exam 9: Continued Assessment of Needs, Threats, and Solutions
Exam 1: Introduction to Disaster Recovery25 Questions
Exam 2: Preparing to Develop the Disaster Recovery Plan43 Questions
Exam 3: Assessing Risk and Impact44 Questions
Exam 4: Prioritizing Systems and Functions for Recovery22 Questions
Exam 5: Identify Data Storage and Recovery Sites24 Questions
Exam 6: Developing Plans, Procedures, and Relationships24 Questions
Exam 7: Developing Procedures for Special Circumstances22 Questions
Exam 8: Testing the Disaster Recovery Plan25 Questions
Exam 9: Continued Assessment of Needs, Threats, and Solutions22 Questions
Select questions type
Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
A
__________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.
Free
(Short Answer)
4.7/5
(35)
Correct Answer:
Backdoors
What type of threat occurs when a Web page is faked to look exactly like a legitimate company's Web page?
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
D
It is important that the meetings conducted after a test not become a place to judge either processes or people but to __________.
(Multiple Choice)
4.9/5
(37)
A type of attack waged on a network in an attempt to flood the network,thereby preventing legitimate access,is called a(n)__________ attack.
(Short Answer)
4.9/5
(29)
Match the following SWOT terms to their meanings:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(26)
It may even be to an organization's benefit to schedule at least _________ dedicated to finding all the places where the system can be broken.
(Multiple Choice)
4.8/5
(30)
__________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information.
(Multiple Choice)
4.8/5
(36)
Which of the SWOT terms point out places where an organization might have core competencies or a competitive edge over the competition?
(Multiple Choice)
4.8/5
(38)
The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.
(Short Answer)
4.8/5
(39)
Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?
(Multiple Choice)
4.8/5
(30)
It is important,before the team has too long of a period of downtime to forget,that they meet at least once to discuss what was done well,what was done poorly,and what was _________
(Short Answer)
4.8/5
(40)
It is often beneficial to the team to praise __________ achievements.
(Multiple Choice)
4.9/5
(25)
What usually follows the fact-finding meetings which follow a recovery,whether drill or real?
(Multiple Choice)
4.8/5
(37)
Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.
(Short Answer)
5.0/5
(30)
Although it is important to not assign blame for things that went badly,it is often beneficial to _________ to give kudos for things that went particularly well.
(Short Answer)
4.8/5
(49)
Typically organizations conduct __________ analyses to determine where they stand with relation to their competitors or to the market as a whole.
(Short Answer)
4.8/5
(37)
Ideally,every threat should be addressed __________ as it is a gap,a place where your organization may find that it is in danger of a future disaster,or at the very least an emergency situation.
(Short Answer)
4.9/5
(41)
Showing 1 - 20 of 22
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)