Quiz: Module 14 Cybersecurity Resilience
Which of the following is a federal initiative that is designed to encourage organizations to address how critical operations will continue under a broad range of negative circumstances? a. DPPR b. COOP c. BIA d. MTBF
COOP
Margaux is reviewing the corporate policy that stipulates the processes to be followed for implementing system changes. Which policy is she reviewing? a. Change format policy b. Change control policy c. Change management policy d. Change modification policy
Change control policy
What does an incremental backup do? a. Copies all files changed since the last full or incremental backup b. Copies all files c. Copies all files since the last full backup d. Copies only user-selected files
Copies all files changed since the last full or incremental backup
Mary Alice has been asked to help develop an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT. What type of planning is this? a. Business impact analysis planning b. Risk IT planning c. IT contingency planning d. Disaster recovery planning
Disaster recovery planning
A BIA can be a foundation for which of the following? a. Site risk assessment b. Contingency reaction plan c. Resumption assessment plan d. Functional recovery plan
Functional recovery plan
Which of the following is NOT used to identify or enforce what mobile devices can do based on the location of the device? a. Geo-spatial b. Geo-tagging c. Geolocation d. Geofencing
Geo-spatial
Which type of site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running? a. Hot site b. Cold site c. Warm site d. Replicated site
Hot site
Thea has received a security alert that someone in London attempted to access the email account of Sigrid, who had accessed it in Los Angeles one hour before. What feature determined an issue and send this alert to Thea? a. Risky IP address b. Impossible Travel c. Remote IP address d. Incompatible Location
Impossible Travel
Which of the following is NOT true about RAID? a. It can be implemented in hardware or software. b. Nested levels can combine other RAID levels. c. The most common levels of RAID are Level 0, 1, 5, 6, and 10. d. It is designed primarily to backup data.
It is designed primarily to backup data.
What is the average amount of time that it will take a device to recover from a failure that is not a terminal failure? a. RTO b. MTTR c. MTBF d. RPO
MTTR
Linnea is researching a type of storage that uses a single storage device to serve files over a network and is relatively inexpensive. What type of storage is Linnea researching? a. RAID b. NAS c. ARI d. SAN
NAS
Molly needs to access a setting in Microsoft Windows Group Policy to change the type of a network to which a computer is attached. Which setting must Molly change? a. Network Config b. Network Location c. Wi-Fi/Wired Network Policy d. Network Type
Network Location
What device is always running off its battery while the main power runs the battery charger? a. Backup UPS b. Secure UPS c. Offline UPS d. Online UPS
Online UPS
Which of the following will a BIA NOT help determine? a. Mission-essential functions b. Percentage availability of systems c. Single point of failure d. Identification of critical systems
Percentage availability of systems
Which of the following is a document that outlines specific requirements or rules that must be met? a. Framework b. Guideline c. Specification d. Policy
Policy
Which of the following can a UPS NOT perform? a. Notify all users that they must finish their work immediately and log off b. Prevent certain applications from launching that will consume too much power c. Disconnect users and shut down the server d. Prevent any new users from logging on
Prevent certain applications from launching that will consume too much power
Which commercial data classification level would be applied to a data set of the number of current employees at an organization and would only cause a small amount of harm if disclosed? a. Confidential b. Open c. Public d. Private
Public
Which of the following is NOT an element that should be part of a BCP? a. Robustness b. High availability c. Diversity d. Scalability
Robustness
Which of these is NOT a factor in determining restoration order? a. Process of fundamental importance b. Dependencies c. Alternative business practices d. Speed of implementation
Speed of implementation
What is a definition of RPO? a. The frequency that data should be backed up b. How a backup utility reads an archive bit c. The maximum length of time that can be tolerated between backups d. Length of time it will take to recover data that has been backed up
The maximum length of time that can be tolerated between backups