Exam 14: Business Continuity
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What is a hot site?
Free
(Essay)
4.8/5
(36)
Correct Answer:
hot site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity.A hot site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running,including office space and furniture,telephone jacks,computer equipment,and a live telecommunications link.Data backups of information can be quickly moved to the hot site,and in some instances the production site automatically synchronizes all its data with the hot site so that all data is immediately accessible.
What RAID type is based on striping,uses multiple drives,and is not fault tolerant if one of the drives fails?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
Which of the following is a location that provides office space,but the customer must provide and install all the equipment needed to continue operations?
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
A
Which term below describes a component or entity in a system which,if it no longer functions,will disable an entire system?
(Multiple Choice)
4.8/5
(40)
An enterprise contingency plan is copying information to a different medium and storing it at an off-site location so that it can be used in the event of a disaster.
(True/False)
4.8/5
(39)
What term is used to describe a documentation of control over evidence,which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?
(Multiple Choice)
4.8/5
(33)
What type of element addresses the recovery of critical information technology (IT)assets,including systems,applications,databases,storage and network assets?
(Multiple Choice)
4.9/5
(42)
What kind of data can be lost when a computer is turned off?
(Multiple Choice)
5.0/5
(34)
Which of the following is the sudden flow of electric current between two objects?
(Multiple Choice)
4.8/5
(36)
Using technology to search for computer evidence of a crime in order to retrieve information,even if it has been altered or erased,that can be used in pursuit of an attacker or criminal is an example of:
(Multiple Choice)
4.9/5
(30)
Multiple sectors on a disk,when combined,are referred to as a:
(Multiple Choice)
4.8/5
(43)
Forensics is the application of science to questions that are of interest to the technology professions.
(True/False)
4.9/5
(29)
Resumption planning is used for the recovery of critical business functions separate from IT,such as resuming a critical manufacturing process.
(True/False)
4.9/5
(38)
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
(Multiple Choice)
5.0/5
(33)
A business impact analysis may include succession planning or determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees.
(True/False)
4.9/5
(47)
Which of the following is caused by a short-duration burst of energy by the source?
(Multiple Choice)
4.9/5
(37)
Which of the following is usually addressed in a disaster recovery plan? (Choose all that apply. )
(Multiple Choice)
4.8/5
(27)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)