M02 Chapter 3 Quiz
Match each item with a statement below. 1. Applications that are made available to users over the Internet 2. Development platforms that are made available to developers over the Internet 3. Implementation in which a service provider makes computing resources available over the Internet 4. Implementation in which several organizations share computing resources 5.A RAID implementation that protects against data loss due to disk failure 6. A RAID implementation that protects against loss of data access due to a single component's failure 7. Implementation of RAID Level 1 8. Allows you to reboot a system from a CD-ROM 9. Bulk transfer of data in batches to an off-site facility
1. Software as a Service (SaaS) 2. Platform as a Service (PaaS 3. Public cloud 4. Community cloud 5. FRDS 6. FTDS 7. Disk mirroring 8. Bare metal recovery 9. Electronic vaulting
An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.
An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.
RAID is an acronym for Redundant Array of Incident-Recovery Drives.
False
____ uses a number of hard drives to store information across multiple drive units.
RAID
____________________ is the transfer of live transactions to an off-site facility.
Remote journaling
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.
SaaS
One real-time protection and data backup strategy is the use of mirroring.
True
Some data is required by law to be retained and stored for years.
True
A(n) ____________________ backup is a backup of a set of specified files, regardless of whether they have been modified or otherwise flagged for backup.
copy
A(n) ____ is an agreement in which the client agrees not to use the vendor's services to compete directly with the vendor, and for the client not to use vendor information to gain a better deal with another vendor.
covenant not to compete
RAID 5 drives can be ____________________, meaning they can be replaced without taking the entire system down.
hot swapped
Considered to be the traditional "lock and copy" approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive.
legacy backup applications
A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization.
moderate
A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and communications methods to provide an online storage environment.
network-attached storage
A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.
nondisclosure agreement
Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and the duration of storage.
retention
Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing backups of data.
robustness
A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facility simultaneously.
time-share
If an organization needs to plan for resumption and cannot justify the expense of an exclusive-use strategy, it can choose a shared-use option. A(n) ____________________ operates like an exclusive-use site but it is leased in conjunction with a business partner or sister organization.
time-share
When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or on a host platform.
virtual machine