Deck 13: Business Continuity

Full screen (f)
exit full mode
Question
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?

A)recovery site
B)recovery point
C)single point of failure
D)cascade point of failure
Use Space or
up arrow
down arrow
to flip the card.
Question
Multiple sectors on a disk, when combined, are referred to as a:

A)cluster
B)track
C)slice
D)platter
Question
Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:

A)symmetric network
B)symmetric server
C)asymmetric network
D)asymmetric server
Question
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A)Business continuity planning and testing
B)Disaster planning
C)Business management planning and testing
D)Enterprise disaster planning
Question
What kind of data can be lost when a computer is turned off?

A)Volatile
B)Static
C)Non-volatile
D)Persistent
Question
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.
Question
Most metadata about a file is generated and recorded automatically without the user's knowledge.
Question
​What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

A)​RAID 0
B)​RAID 1
C)​RAID 2
D)​RAID 5
Question
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
Question
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
Question
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?

A)Enterprise recovery
B)Disaster recovery
C)Business recovery
D)Emergency recovery
Question
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

A)Computer forensics
B)Penetration testing
C)Vulnerability testing
D)Risk management
Question
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?

A)65
B)75
C)85
D)95
Question
In what type of server cluster can services fail over from downed servers to functional servers?

A)symmetric network
B)asymmetric network
C)symmetric server
D)symmetric network
Question
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:

A)service level agreement
B)recovery point objective
C)recovery time objective
D)service point agreement
Question
How can an administrator keep devices powered when power is interrupted?

A)uninterruptible power supply
B)redundant power supply
C)uninterruptible system supply
D)replica power supply
Question
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

A)system standard
B)system view
C)system image
D)system baseline
Question
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

A)bollard
B)mantrap
C)Faraday cage
D)Newton cage
Question
What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A)chain of value
B)chain of use
C)chain of property
D)chain of custody
Question
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
Question
The remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?

A)Disk slack
B)RAM slack
C)ROM slack
D)Edge slack
Question
____________________ is data about data.
Question
A system that can function for an extended period of time with little downtime is said to have ___________________.​
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Combining two or more servers to appear as one single unit.​
Question
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

A)cold site
B)hot site
C)spare site
D)warm site
Question
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.​
Question
What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?

A)RAM slack
B)Edge slack
C)Drive file slack
D)Sector slack
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The ability of an organization to maintain its operations and services in the face of a disruptive event.​
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The process of identifying threats.
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The ability of a business to continue to function in the even of a disaster.
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.​
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The maximum length of time that an organization can tolerate between backups.​
Question
Windows stores files on a hard drive in 512-byte blocks called ____________________.
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Using technology to search for computer evidence of a crime.​
Question
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

A)baseline
B)mirror image
C)logical image
D)thin image
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.​
Question
RAID 0 technology is based on ____________________.
Question
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?

A)Business risk analysis
B)Business alert assessment
C)Business productivity analysis
D)Business impact analysis (BIA)
Question
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A metallic enclosure that prevents the entry or escape of an electromagnetic field.​
Question
What are the objectives of disaster exercises?
Question
Explain how to best capture volatile data.
Question
Identify two scenarios that could be used in a BIA.
Question
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
Question
Discuss the purpose and importance of the chain of custody.
Question
Describe the purpose of a disaster recovery plan.
Question
When creating a data backup plan or policy, what five basic questions should be answered?​
Question
What is required upon completion of an evidence examination?
Question
Describe what happens when the response team arrives and secures the crime scene.
Question
What are the steps in damage control?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Business Continuity
1
Which term below describes a component or entity in a system which, if it no longer functions, will disable an entire system?

A)recovery site
B)recovery point
C)single point of failure
D)cascade point of failure
C
2
Multiple sectors on a disk, when combined, are referred to as a:

A)cluster
B)track
C)slice
D)platter
A
3
Select below the type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems, and file and print services:

A)symmetric network
B)symmetric server
C)asymmetric network
D)asymmetric server
D
4
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A)Business continuity planning and testing
B)Disaster planning
C)Business management planning and testing
D)Enterprise disaster planning
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What kind of data can be lost when a computer is turned off?

A)Volatile
B)Static
C)Non-volatile
D)Persistent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Most metadata about a file is generated and recorded automatically without the user's knowledge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
​What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

A)​RAID 0
B)​RAID 1
C)​RAID 2
D)​RAID 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A subset of business continuity planning and testing is disaster recovery, also known as IT recovery planning.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of plans include procedures to address redundancy and fault tolerance as well as data backups?

A)Enterprise recovery
B)Disaster recovery
C)Business recovery
D)Emergency recovery
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

A)Computer forensics
B)Penetration testing
C)Vulnerability testing
D)Risk management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today leaves behind digital evidence that can be retrieved via computer forensics?

A)65
B)75
C)85
D)95
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
In what type of server cluster can services fail over from downed servers to functional servers?

A)symmetric network
B)asymmetric network
C)symmetric server
D)symmetric network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:

A)service level agreement
B)recovery point objective
C)recovery time objective
D)service point agreement
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
How can an administrator keep devices powered when power is interrupted?

A)uninterruptible power supply
B)redundant power supply
C)uninterruptible system supply
D)replica power supply
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:

A)system standard
B)system view
C)system image
D)system baseline
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:

A)bollard
B)mantrap
C)Faraday cage
D)Newton cage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A)chain of value
B)chain of use
C)chain of property
D)chain of custody
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
RAM slack can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?

A)Disk slack
B)RAM slack
C)ROM slack
D)Edge slack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____________________ is data about data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A system that can function for an extended period of time with little downtime is said to have ___________________.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Combining two or more servers to appear as one single unit.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

A)cold site
B)hot site
C)spare site
D)warm site
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Generally, ____________________ focuses on restoring computing and technology resources to their former state.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What kind of slack is created from information stored on a hard drive, which can contain remnants of previously deleted files or data?

A)RAM slack
B)Edge slack
C)Drive file slack
D)Sector slack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The ability of an organization to maintain its operations and services in the face of a disruptive event.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The process of identifying threats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
​The ability of a business to continue to function in the even of a disaster.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
The maximum length of time that an organization can tolerate between backups.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Windows stores files on a hard drive in 512-byte blocks called ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
Using technology to search for computer evidence of a crime.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?

A)baseline
B)mirror image
C)logical image
D)thin image
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
RAID 0 technology is based on ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?

A)Business risk analysis
B)Business alert assessment
C)Business productivity analysis
D)Business impact analysis (BIA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Matching
a. Business continuity
b. Chain of custody
c. Clustering
d. Computer forensics
e. Continuity of operations f. Faraday cage
g. Hot site
h. Mean time between failures (MTBF)
i. Recovery point objective j. Risk assessment
A metallic enclosure that prevents the entry or escape of an electromagnetic field.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are the objectives of disaster exercises?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain how to best capture volatile data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Identify two scenarios that could be used in a BIA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What does Windows do if a file being saved is not long enough to fill up the last sector on the disk?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss the purpose and importance of the chain of custody.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe the purpose of a disaster recovery plan.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
When creating a data backup plan or policy, what five basic questions should be answered?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is required upon completion of an evidence examination?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe what happens when the response team arrives and secures the crime scene.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the steps in damage control?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.