Exam 13: Business Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What kind of data can be lost when a computer is turned off?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

Explain how to best capture volatile data.

Free
(Essay)
4.8/5
(32)
Correct Answer:
Verified

Capturing this volatile information can best be performed by capturing the entire system image, which is a snapshot of the current state of the computer that contains all current settings and data.

In what type of server cluster can services fail over from downed servers to functional servers?

Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
Verified

C

What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

(Multiple Choice)
4.8/5
(32)

What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?

(Multiple Choice)
4.7/5
(30)

When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?

(Multiple Choice)
4.9/5
(36)

Windows stores files on a hard drive in 512-byte blocks called ____________________.

(Short Answer)
4.8/5
(28)

A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.

(True/False)
5.0/5
(38)

Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

(Multiple Choice)
4.9/5
(31)

Multiple sectors on a disk, when combined, are referred to as a:

(Multiple Choice)
4.9/5
(38)

When creating a data backup plan or policy, what five basic questions should be answered?​

(Essay)
5.0/5
(33)

What are the steps in damage control?

(Essay)
4.9/5
(32)

RAID 0 technology is based on ____________________.

(Short Answer)
4.7/5
(30)

Matching -A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.​

(Multiple Choice)
4.8/5
(37)

Matching -A metallic enclosure that prevents the entry or escape of an electromagnetic field.​

(Multiple Choice)
4.9/5
(34)

A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

(Multiple Choice)
4.8/5
(32)

The remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?

(Multiple Choice)
4.9/5
(35)

Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.

(True/False)
4.9/5
(37)

Matching -A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.​

(Multiple Choice)
4.9/5
(38)

Matching -Combining two or more servers to appear as one single unit.​

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)