Quiz: Module 14 Cybersecurity Resilience

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a federal initiative that is designed to encourage organizations to address how critical operations will continue under a broad range of negative circumstances? a. DPPR b. COOP c. BIA d. MTBF

COOP

Margaux is reviewing the corporate policy that stipulates the processes to be followed for implementing system changes. Which policy is she reviewing? a. Change format policy b. Change control policy c. Change management policy d. Change modification policy

Change control policy

What does an incremental backup do? a. Copies all files changed since the last full or incremental backup b. Copies all files c. Copies all files since the last full backup d. Copies only user-selected files

Copies all files changed since the last full or incremental backup

Mary Alice has been asked to help develop an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT. What type of planning is this? a. Business impact analysis planning b. Risk IT planning c. IT contingency planning d. Disaster recovery planning

Disaster recovery planning

A BIA can be a foundation for which of the following? a. Site risk assessment b. Contingency reaction plan c. Resumption assessment plan d. Functional recovery plan

Functional recovery plan

Which of the following is NOT used to identify or enforce what mobile devices can do based on the location of the device? a. Geo-spatial b. Geo-tagging c. Geolocation d. Geofencing

Geo-spatial

Which type of site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running? a. Hot site b. Cold site c. Warm site d. Replicated site

Hot site

Thea has received a security alert that someone in London attempted to access the email account of Sigrid, who had accessed it in Los Angeles one hour before. What feature determined an issue and send this alert to Thea? a. Risky IP address b. Impossible Travel c. Remote IP address d. Incompatible Location

Impossible Travel

Which of the following is NOT true about RAID? a. It can be implemented in hardware or software. b. Nested levels can combine other RAID levels. c. The most common levels of RAID are Level 0, 1, 5, 6, and 10. d. It is designed primarily to backup data.

It is designed primarily to backup data.

What is the average amount of time that it will take a device to recover from a failure that is not a terminal failure? a. RTO b. MTTR c. MTBF d. RPO

MTTR

Linnea is researching a type of storage that uses a single storage device to serve files over a network and is relatively inexpensive. What type of storage is Linnea researching? a. RAID b. NAS c. ARI d. SAN

NAS

Molly needs to access a setting in Microsoft Windows Group Policy to change the type of a network to which a computer is attached. Which setting must Molly change? a. Network Config b. Network Location c. Wi-Fi/Wired Network Policy d. Network Type

Network Location

What device is always running off its battery while the main power runs the battery charger? a. Backup UPS b. Secure UPS c. Offline UPS d. Online UPS

Online UPS

Which of the following will a BIA NOT help determine? a. Mission-essential functions b. Percentage availability of systems c. Single point of failure d. Identification of critical systems

Percentage availability of systems

Which of the following is a document that outlines specific requirements or rules that must be met? a. Framework b. Guideline c. Specification d. Policy

Policy

Which of the following can a UPS NOT perform? a. Notify all users that they must finish their work immediately and log off b. Prevent certain applications from launching that will consume too much power c. Disconnect users and shut down the server d. Prevent any new users from logging on

Prevent certain applications from launching that will consume too much power

Which commercial data classification level would be applied to a data set of the number of current employees at an organization and would only cause a small amount of harm if disclosed? a. Confidential b. Open c. Public d. Private

Public

Which of the following is NOT an element that should be part of a BCP? a. Robustness b. High availability c. Diversity d. Scalability

Robustness

Which of these is NOT a factor in determining restoration order? a. Process of fundamental importance b. Dependencies c. Alternative business practices d. Speed of implementation

Speed of implementation

What is a definition of RPO? a. The frequency that data should be backed up b. How a backup utility reads an archive bit c. The maximum length of time that can be tolerated between backups d. Length of time it will take to recover data that has been backed up

The maximum length of time that can be tolerated between backups


Conjuntos de estudio relacionados

Wordly Wise 3000 - Book 7 - Lesson 2

View Set

EQUATIONS, Multi-Step Equations, multi-step equations decimals

View Set

DRAM 2366 Intro to cinema Exam 2

View Set

World History - Doherty Final exam Semester 2

View Set

Objective 2: Accounting and Value Measures / Managerial Accounting

View Set