info 12
Which of the following types of penetration testing focuses on the system, using techniques such as port scans, traceroute information, and network mapping to find weaknesses?
Active reconnaissance
Which of the following is a reversion from a change that had negative consequences?
Backout
The process of automatically switching from a malfunctioning system to another system is called what?
Failover
According to CERT, which of the following would be a formalized or an ad hoc team you can call upon to respond to an incident after it arises?
CSIRT
Which of the following would normally not be part of an incident response policy?
Contingency plans
Which of the following types of vulnerability scans uses actual network authentication to connect to systems and scan for vulnerabilities?
Credentialed
Your company is about to invest heavily in a new server farm and have made an attractive offer for a parcel of land in another country. A consultant working on another project hears of this and suggests that you get the offer rescinded because the laws in that country are much more stringent than where you currently operate. Which of the following is the concept that data is subject to the laws of where it is stored?
Data sovereignty
Which backup system backs up all the files that have changed since the last full backup?
Differential backup
Which plan or policy helps an organization determine how to relocate to an emergency site?
Disaster-recovery plan
Which process involves consulting policies and determining how best to conduct an investigation into the incident?
Escalation
Which backup type is a complete, comprehensive backup of all files on a disk or server?
Full
Which of the following is a concept that works on the assumption that any information created on any system is stored forever?
Full archival
A method that works on the assumption that any information created on any system is stored permanently is known as which of the following?
Full archival method
You're a consultant brought in to advise MTS on its backup procedures. One of the first problems you notice is that the company doesn't use a good tape-rotation scheme. Which backup method uses a rotating schedule of backup media to ensure long-term information storage?
Grandfather, Father, Son method
In which type of testing do testers perform with some limited knowledge of the target system?
Gray box
Which backup type uses optical or tape jukeboxes for providing continuous online backups?
HSM
Which of the following is a newer backup type that provides continuous online backup by using optical or tape jukeboxes and can be configured to provide the closest version of an available real-time backup?
HSM
Which of the following is the most expensive recovery site?
Hot
Which recovery site is described in the statement given below?"A location that provides operations within hours of a failure"
Hot
You're trying to rearrange your backup procedures to reduce the amount of time they take each evening. You want the backups to finish as quickly as possible during the week. Which backup system backs up only the files that have changed since the last backup?
Incremental backup
Which type of penetration-style testing involves actually trying to break into the network?
Intrusive
Which of the following is the process used during data acquisition for the preservation of all forms of relevant information when litigation is reasonably anticipated?
Legal hold
What is the last step performed in the incident response process?
Lessons learned
A level of testing that starts up all backup systems but leaves the main systems functioning is described as which of the following?
Parallel test
Karl is conducting penetration testing on the Pranks Anonymous servers and having difficulty finding a weakness. Suddenly, he discovers that security on a different company's server—a vendor to Pranks Anonymous—can be breached. Once he has compromised the completely different company's server, he can access the Pranks Anonymous servers and then launch an attack. What is this weakness/exploit known as?
Pivot
You're the head of information technology for MTS and have a brother in a similar position for ABC. The companies are approximately the same size and are located several hundred miles apart. As a benefit to both companies, you want to implement an agreement that would allow either company to use resources at the other site should a disaster make a building unusable. What type of agreement between two organizations provides mutual use of their sites in the event of an emergency?
Reciprocal agreement
What is another name for working copies?
Shadow copies
Which site best provides limited capabilities for the restoration of services in a disaster?
Warm site
Although you're talking to her on the phone, the sound of the administrative assistant's screams of despair can be heard down the hallway. She has inadvertently deleted a file that the boss desperately needs. Which type of backup is used for the immediate recovery of a lost file?
Working copies
The process of identifying what has occurred on a system by examining the data trail is known as:
forensic