cyb155

¡Supera tus tareas y exámenes ahora con Quizwiz!

Root cause analysis is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or similar setting. False True

False

The disaster recovery preparation team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters. _____ True False

False

The total time needed to place the business function back in service must be longer than the maximum tolerable downtime. False True

False

The work response time (WRT) is the amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered. _____ True False

False

The detailed documentation of the collection, storage, transfer, and ownership of evidentiary material from the crime scene through its presentation in court and its eventual disposition. is called a(n) _____. search warrant chain of evidence audit trail evidence affidavit

chain of evidence

The CPMT should include a _____ who is a high-level manager to support, promote, and endorse the findings of the project and could be the COO or (ideally) the CEO/president. champion executive-in-charge project instigator project manager

champion

Ideally, the _____, systems administrators, the chief information security officer (CISO), and key IT and business managers should be actively involved during the creation and development of all CP components chief executive officer (CEO) senior auditor chief information officer (CIO) chief financial officer (CFO)

chief information officer (CIO)

The transfer of large batches of data to an off-site facility, usually through leased lines or services, is called ____. off-site storage database shadowing remote journaling electronic vaulting

electronic vaulting

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes _____. controls have failed All of the above controls have been bypassed controls have proven ineffective

All of the above

The CPMT conducts the BIA in three stages. Which of the following is NOT one of those stages? Identify recovery priorities for system resources Determine mission/business processes and recovery criticality All of these are BIA stages Identify resource requirements

All of these are BIA stages

_____ is the rapid determination of the scope of the breach in the confidentiality, integrity, and availability of information and information assets during or just following an incident. Incident response Damage assessment Containment development Disaster assessment

Damage assessment

A business influence analysis (BIA) is an investigation and assessment of adverse events that can affect the organization. False True

False

A business policy is a task performed by an organization or one of its units in support of the organization's overallmission and operations. _____ False True

False

A cold site provides many of the same services and options of a hot site, but at a lower cost. False True

False

A disaster recovery plan shows the organization's intended efforts to establish operations at an alternate site in the aftermath of a disaster. True False

False

A planning check is a testing strategy in which copies of the appropriate plans are distributed to all individuals who will be assigned roles during an actual incident or disaster. _____ True False

False

A rapid-onset disaster is one that gradually degrades the capacity of an organization to withstand their effects. False True

False

A recovery time objective (RTO) is the total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption. False True

False

A(n) DR plan ensures that critical business functions continue if a catastrophic incident or disaster occurs. _____ True False

False

A(n) alarming event is an event with negative consequences that could threaten the organization's information assets or operations._____ True False

False

An affidavit is permission to search for evidentiary material at a specified location or to seize items to return to an investigator's lab for examination. True False

False

An after-action re-assessment is an opportunity for everyone who was involved in an incident or disaster to sit down and discuss what happened. _____ True False

False

An after-action review is an opportunity for everyone who was involved in planning for an incident or disaster to sit down and discuss what will happen when the plan is implemented. True False

False

An external event is an event with negative consequences that could threaten the organization's information assets or operations; also referred to as an incident candidate. False True

False

An incident is an adverse event that could result in a loss of information assets and threatens the viability of the entire organization. False True

False

Changes to systems logs are a possible indicator of an actual incident. True False

False

Crisis response is an organization's set of planning and preparation efforts for dealing with potential human injury, emotional trauma, or loss of life as a result of a disaster. False True

False

Database shadowing duplicates data in real-time data storage, but does not back up the databases at the remote site. False True

False

Incident detail assessment is used to determine the impact from a breach of confidentiality, integrity, and availability on information and information assets. _____ True False

False

Procedures are planned for each identified incident scenario with incident handling procedures established for before and during the incident. True False

False

Reported attacks are a definite indicator of an actual incident. _____ False True

False

Two ways to activate an alert roster are simultaneously and in parallel. False True

False

Each of the following is a role for the crisis management response team EXCEPT: Keeping the public informed about the event Informing local emergency services to respond to the crisis Supporting personnel and their loved ones during the crisis Communicating with major customers and other stakeholders

Informing local emergency services to respond to the crisis

Which type of organizations should prepare for the unexpected? Only those without good insurance. Organizations of every size and purpose should also prepare for the unexpected. Large organizations which have many assets at risk. Small organizations that can easily recover.

Organizations of every size and purpose should also prepare for the unexpected.

____ uses a number of hard drives to store information across multiple drive units. Virtualization RAID Continuous database protection Legacy backup

RAID

Which if these is the primary reason contingency response teams should not have overlapping membership with one person on multiple teams? To spread the work out among more people. To avoid cross-division rivalries. So individuals don't find themselves with different responsibilities in different locations at the same time. To allow people to specialize in one area.

So individuals don't find themselves with different responsibilities in different locations at the same time.

A business process is a task performed by an organization or one of its units in support of the organization's overall mission and operations. False True

True

A business process is a task performed by an organization or one of its units in support of the organization's overall mission and operations. True False

True

A service bureau is an agency that provides a service for a fee. _____ True False

True

An affidavit is a sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place. True False

True

Prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment. _____ False True

True

Prior to the development of each of the types of contingency planning documents, the CP team should work todevelop the policy environment. True False

True

Reported attacks are a probable indicator of an actual incident. False True

True

The business impact analysis is a preparatory activity common to both CP and risk management, True False

True

The business impact analysis is a preparatory activity common to both CP and risk management. True False

True

The organization must choose one of two philosophies that will affect its approach to IR and DR as well as subsequent involvement of digital forensics and law enforcement: protect and forget or apprehend and prosecute _____ False True

True

The organization must choose one of two philosophies that will affect its approach to IR and DR as well as subsequent involvement of digital forensics and law enforcement: the two approaches are protect and forget, and apprehend and prosecute. False True

True

The process of examining an incident candidate and determining whether it constitutes an actual incident is called incident classification. _____ False True

True

The recovery point objective (RPO) is the point in time prior to a disruption or system outage to which mission/business process data can be recovered after an outage. _____ True False

True

The work recovery time (WRT) is the amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered. True False

True

A(n) _____ is a document containing contact information for the people to be notified in the event of an incident. phone list call registry alert roster emergency notification system

alert roster

Most common data backup schemes involve ______. both a and/or b RAID disk-to-disk-to-cloud neither a nor b

both a and/or b

A ____ site provides only rudimentary services and facilities. hot cold commercial warm

cold

The most common schedule for tape-based backup is a _____ backup, either incremental or differential, with a weekly off-site full backup. hourly off-site 12-hour on-site daily on-site daily off-site

daily on-site

The storage of duplicate online transaction data, along with the duplication of the databases, at a remote site on a redundant server is called _____. application recovery electronic vaulting remote journaling database shadowing

database shadowing

A crime involving digital media, computer technology, or related components may best be called an act of _____. digital malfeasance computer trespass digital abuse computer theft

digital malfeasance

The process of examining an adverse event or incident and determining whether it constitutes an actual disaster is known as _____. incident review disaster classification event escalation disaster indication

disaster classification

An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor with a ____ backup strategy. RAID disk-to-disk-to-cloud differential disk-to-disk-to-tape

disk-to-disk-to-cloud

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a moment's notice. mobile site service bureau hot site cold site

hot site

The total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption is _____. recovery point objective (RPO) maximum tolerable downtime (MTD) work recovery time (WRT) recovery time objective (RTO)

maximum tolerable downtime (MTD)

A potential disadvantage of a timeshare site-resumption strategy is: more expensive than other options all of the above requires additional investment in time and technology to get up to speed in the event of a disaster more than one organization might need the facility

more than one organization might need the facility

Digital forensics involves the _____, identification, extraction, documentation, and interpretation of digital media. preservation determination investigation confiscation

preservation

The point in time before a disruption or system outage to which business process data can be recovered after an outage is ____. work recovery time (WRT) maximum tolerable downtime (MTD) recovery point objective (RPO) recovery time objective (RTO)

recovery point objective (RPO)

Data backup should be based on a(n) ____ policy that specifies how long log data should be maintained . incident response replication business resumption retention

retention

A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor. time-share agreement mutual agreement memorandum of understanding service agreement

service agreement

A(n) disaster is any adverse event that could result in loss of an information asset or assets, but does not currently threaten the viability of the entire organization. _____ True False

False

A(n) disaster recovery plan includes the steps necessary to ensure the continuation of the organization when a disaster's scope or scale exceeds the ability of the organization to restore operations, usually through relocation of critical business functions to an alternate location. _____ True False

False

A(n) sequential roster is activated as the first person calls a few people on the roster, who in turn call a few other people. _____ True False

False

The computer security incident response team is composed solely of technical IT professionals who are prepared to detect, react to, and recover from an incident. True False

False

The continuity planning management team (CPMT) is the group of senior managers and project members organized to conduct and lead all contingency planning efforts. True False

False

Use of dormant accounts is a probable indicator of an actual incident. True False

False

​An attack, breach of policy, or other incident always constitutes a violation of law, requiring notification of law enforcement. True False

False

An alert message is a description of the incident or disaster that usually contains just enough information so that each person knows what portion of the IR or DR plan to implement without slowing down the notification process. False True

True

Disaster classification is the process of examining an adverse event or incident and determining whether it constitutes an actual disaster. True False

True

Evidentiary material is any information that could potentially support an organization's legal or policy-based case against a suspect. True False

True

Forensics can provide a determination of the source or origin of an event, problem, or issue like an incident. False True

True

Incident classification is the process of examining an adverse event or incident candidate and determining whether it constitutes an actual incident. False True

True

Incident damage assessment is used to determine the impact from a breach of confidentiality, integrity, and availability on information and information assets. True False

True

Incident response is an organization's set of planning and preparation efforts for detecting, reacting to, and recovering from an incident. True False

True

The chain of evidence is the detailed documentation of the collection, storage, transfer, and ownership of evidentiary material from the crime scene through its presentation in court and its eventual disposition. True False

True

The disaster recovery planning team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters. False True

True

Using a service bureau is a BC strategy in which an organization contracts with a service agency to provide a facility for a fee. False True

True

The sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place is called a(n) _____. writ of habeus corpus affidavit search warrant sworn warrant

affidavit

The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources is ____. recovery time objective (RTO) recovery point objective (RPO) maximum tolerable downtime (MTD) work recovery time (WRT)

recovery time objective (RTO)

The transfer of transaction data in real time to an off-site facility is called ____. electronic vaulting database shadowing remote journaling off-site storage

remote journaling

A ____ is an agency that provides physical facilities in the event of a disaster for a fee. cold site time-share mobile site service bureau

service bureau


Conjuntos de estudio relacionados

Nursing 301 Exam 2 Practice Questions

View Set

RN Community Health Online Practice 2023 A

View Set

Unit 14.8 Quiz: East Asia Since 1945

View Set