10.6.20 Section Quiz Fundamentals

¡Supera tus tareas y exámenes ahora con Quizwiz!

Sets expectations for user privacy when using company resources.

Acceptable Use Policy

What is a disadvantage of using the cloud for data storage?

Cloud storage backups require a reliable internet connection. EXPLANATION While cloud storage is usually convenient, scalable, and cost-effective, the fact that it requires a reliable internet connection can be a disadvantage in some disaster recovery scenarios.

Identifies a set of rules or standards that define personal behaviors.

Code of Ethics

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe. EXPLANATION If you can't store backup tapes at an offsite location, you should make sure that the backup tapes are locked up (for security) and that measures are taken to protect the tapes from a disaster (such as a fire).

Provides a high-level overview of the organization's security program.

Organizational Security Policy

Specifies that user accounts should be locked after a certain number of failed login attempts.

Password Policy

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Regularly test restoration procedures.

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives EXPLANATION Data wiping software will sanitize or clean a device by removing all data remnants. Sanitization is necessary because deleting, overwriting, and reformatting (even multiple times) does not remove all data remnants. Sanitization securely removes sensitive data from storage media and is designed to solve the data remanence problem for devices that will be reused. It is the best way to remove Personally Identifiable Information (PII) from a hard disk before reuse.

There are three main types of redundancy:

data, network, and power.

Replication

is a backup method that provides fault tolerance but typically requires an additional system to take over operations.

Backup

provides a copy of data; however, backups take time to restore and do not always keep a system online and accessible.

Redundancy

provides fault tolerance through duplication that helps keep a system available even after a component failure.

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process?

Perform a backup.

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Prioritization EXPLANATION This part of a disaster recovery plan is called prioritization. Understanding the most critical business functions can help IT administrators prioritize which systems need to be restored first after a disaster.

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?

Redundancy


Conjuntos de estudio relacionados

Chapter 11 Micro Econ Full Study Guide

View Set

#3 Transport Across Cell Membranes

View Set

Chapter 19 - Effective Communication and Conflict Resolution

View Set

French 5-6 Qu'est-ce qui t'arrive

View Set

Chapter 13 Review and Test Questions

View Set

Dynamic Planet Exam 2 (Class Notes)

View Set

Silvestri Cardiovascular (HTN, HF, Vascular)

View Set