Deck 13: Business Continuity
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 13: Business Continuity
1
Most metadata about a file is generated and recorded automatically without the user's knowledge.
True
2
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
False
3
In a(n) ____ cluster, every server in the cluster performs useful work.
A) symmetric network
B) asymmetric network
C) symmetric server
D) symmetric network
A) symmetric network
B) asymmetric network
C) symmetric server
D) symmetric network
C
4
A ____ is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service.
A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement
A) service level agreement
B) recovery point objective
C) recovery time objective
D) service point agreement
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is a device that maintains power to equipment in the event of an interruption in the primary electrical power source.
A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply
A) uninterruptible power supply
B) redundant power supply
C) uninterruptible system supply
D) replica power supply
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring the electromagnetic fields.
A) Newton phreaking
B) Van Eck phreaking
C) Van Zek hacking
D) EMF phreaking
A) Newton phreaking
B) Van Eck phreaking
C) Van Zek hacking
D) EMF phreaking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ response team serves as first responders whenever digital evidence needs to be preserved.
A) incident
B) computer forensics
C) risk
D) emergency
A) incident
B) computer forensics
C) risk
D) emergency
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
In a(n) ____ cluster, a standby server exists only to take over for another server in the event of its failure.
A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server
A) symmetric network
B) symmetric server
C) asymmetric network
D) asymmetric server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.
A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
System availability is often expressed as a percentage of uptime in a year.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ typically begins by identifying threats through a risk assessment.
A) BRA
B) BAA
C) BPA
D) BIA
A) BRA
B) BAA
C) BPA
D) BIA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is a metallic enclosure that prevents the entry or escape of an electromagnetic field.
A) bollard
B) mantrap
C) Faraday cage
D) Newton cage
A) bollard
B) mantrap
C) Faraday cage
D) Newton cage
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ is a component or entity in a system which, if it no longer functions, will disable the entire system.
A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure
A) recovery site
B) recovery point
C) single point of failure
D) cascade point of failure
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is designed to ensure that an organization can continue to function in the event of a natural or man-made disaster.
A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning
A) Business continuity planning and testing
B) Disaster planning
C) Business management planning and testing
D) Enterprise disaster planning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ plans typically include procedures to address redundancy and fault tolerance as well as data backups.
A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery
A) Enterprise recovery
B) Disaster recovery
C) Business recovery
D) Emergency recovery
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ has all of the equipment installed, but does not have active Internet or telecommunications facilities, and does not have current backups of data.
A) cold site
B) hot site
C) spare site
D) warm site
A) cold site
B) hot site
C) spare site
D) warm site
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ data is the most difficult type of data to capture.
A) Volatile
B) Static
C) Non-volatile
D) Persistent
A) Volatile
B) Static
C) Non-volatile
D) Persistent
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
According to the Federal Bureau of Investigation (FBI), almost ____ percent of crimes committed today leave behind digital evidence that can be retrieved through computer forensics.
A) 65
B) 75
C) 85
D) 95
A) 65
B) 75
C) 85
D) 95
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____ pertains only to the last sector of a file.
A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
A) Disk slack
B) RAM slack
C) ROM slack
D) Edge slack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.
A) chain of value
B) chain of use
C) chain of property
D) chain of custody
A) chain of value
B) chain of use
C) chain of property
D) chain of custody
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Discuss the purpose and importance of the chain of custody.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ backup is an evidence-grade backup because its accuracy meets evidence standards.
A) baseline
B) mirror image
C) logical image
D) thin image
A) baseline
B) mirror image
C) logical image
D) thin image
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ is a snapshot of the current state of the computer that contains all current settings and data.
A) system standard
B) system view
C) system image
D) system baseline
A) system standard
B) system view
C) system image
D) system baseline
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Windows stores files on a hard drive in 512-byte blocks called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Multiple sectors are used to make up a ____.
A) cluster
B) track
C) slice
D) platter
A) cluster
B) track
C) slice
D) platter
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Describe what happens when the response team arrives and secures the crime scene.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe the Windows page file and discuss why it can be important for evidence recovery.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
RAID 0 technology is based on ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Explain how to best capture volatile data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.
A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack
A) RAM slack
B) Edge slack
C) Drive file slack
D) Sector slack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the steps in damage control?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the objectives of disaster exercises?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ is data about data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Identify two scenarios that could be used in a BIA.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
The air-handling space above drop ceilings (and sometimes even between the walls and under structural floors) used to circulate and otherwise handle air in a building are called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the purpose of a disaster recovery plan.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What is required upon completion of an evidence examination?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck