Fundamentals of Information Security
cold site
Least expensive but has longest switchover time
Risk methodology
A description of how you will manage overall risk. It includes the approach, required information, and techniques to address each risk.
disaster recovery plan
A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
Recovery Time Objective (RTO)
Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining?
HIPAA
Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers?
Warm site
Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?
Business Continuity Plan
Guidelines and arrangements for response to disruption of critical business functions, to restore and maintain operation.
hot site
Most expensive option, least switchover
Business continuity plan (BCP)
Tom is the IT manager for an organization that experienced a server failure that affected a single business function. What type of plan should guide the organization's recovery effort?
Mobile site
Very flexible fairly short switchover time and widely varying costs based on size and capacity
Family Education Rights and Privacy Act (FERPA)
What compliance regulation applies specifically to the educational records maintained by schools about students?
safety
What is NOT one of the three tenets of information security?
No technology infrastructure
What level of technology infrastructure should you expect to find in a cold site alternative data center facility?
Risk = Threat x Vulnerability
Which formula is typically used to describe the components of information security risks?
Data Ownership
Which item in a Bring Your Own Device (BYOD) policy helps resolve intellectual property issues that may arise as the result of business use of personal devices?
Facility Repair
Which one of the following is an example of a direct cost that might result from a business disruption?