CISSP Chapter 18: Disaster Recovery Planning

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

____________ controls protect the integrity of data networks under load.

Quality of Service (QoS)

What are the 4 main RAID configurations?

RAID-0, RAID-1, RAID-5, RAID-10

What are the 5 main types of disaster recovery plan (DRP) tests/testing procedures?

Read-through tests, structured walk-throughs, simulation tests, parallel tests, and full interruption tests

RAID-____ is also called striping. It uses 2 or more disks and improves the disk subsystem performance, but it does not provide fault tolerance.

0

RAID-____ is also called mirroring. It uses two disks, which both hold the same data. If one disk fails, the other disk includes the data so a system can continue to operate after a single disk fails.

1

RAID-_____ is also known as RAID 1+0 or a stripe of mirrors, and is configured as two or more mirrors (RAID-1) configured in a striped (RAID-0) configuration. Uses at least 4 disks but can support more as long as an even number of disks are added. It will continue to operate even if multiple disks fail, as long as at least one drive in each mirror continues to function.

10

RAID-_____ is also called striping with parity. It uses 3 or more disks with the equivalent of one disk holding parity information. If any single disk fails, the RAID array will continue to operate, though it will be slower.

5

__________ recovery means that the system is able to perform trusted hardware activities to restore itself against at least one type of failure.

Automated

_____________ recovery means that a system can restore itself against at least one type of failure and includes mechanisms to ensure that specific objects are protected to prevent their loss. Includes steps to restore data and other objects.

Automated without Undue Loss

______________ is the network capacity available to carry communications.

Bandwidth

What factors influence Quality of Service (QoS)?

Bandwidth, latency, jitter, packet loss, and interference

_____________ are standby facilities large enough to handle the processing load of an organization and equipped with appropriate electrical and environmental support systems. Things like large warehouses, empty office buildings, or other similar structures. However, they have no computing facilities preinstalled and have no active broadband communications links (other than maybe a few phone lines).

Cold sites

What are the types of alternate processing sites?

Cold sites, hot sites, warm sites, and mobile sites

____________ backups store all files that have been modified since the time of the most recent full backup. Only files that have the archive bit turned on, enabled, or set to 1 are duplicated. This type of backup does not change the archive bit.

Differential

________________ means that database backups are moved to a remote site using bulk transfers. The remote location may be a dedicated alternative recovery site or simply an offsite location managed within the company or by a contractor for the purpose of maintaining backup data.

Electronic vaulting

What are the 3 main techniques used to create offsite copies of database content?

Electronic vaulting, remote journaling, and remote mirroring

Systems can be designed so that they fail in what 2 ways?

Fail-secure or fail-open

What are the two elements of the recovery process that are addressed to implement a trusted solution?

Failover preparation and system recovery

_____________ is the ability of a system to suffer a fault but continue to operate. Achieved by adding redundant components, such as a RAID array or additional servers within a failover clustered configuration.

Fault tolerance

____________ backups store a complete copy of the data contained on the protected device. They duplicate every file on the system regardless of the setting of the archive bit. Once this type of backup is complete, the archive bit on every file is reset, turned off, or set to 0.

Full

What combination of backup techniques only requires restoring 2 backups?

Full and Differential

What are the 3 main types of backups?

Full, incremental, and differential

______________ are a type of DRP testing that involve actually shutting down operations at the primary site and shifting them to the recovery site. Extremely difficult to arrange.

Full-interruption

___________ recovery means that systems are able to automatically recover specific functions, ensuring that they will be either restored or rolled back to a secure state.

Function

_____________ backups store only those files that have been modified since the time of the most recent full or incremental backup. Only files that have the archive bit turned on, enabled, or set to 1 are duplicated. Once this type of backup is complete, the archive bit on all duplicated files is reset, turned off, or set to 0.

Incremental

_____________ is electrical noise, faulty equipment, and other factors that may corrupt the contents of packets.

Interference

_____________ is the variation in latency between different packets.

Jitter

_____________ is the time it takes a packet to travel from source to destination.

Latency

_______________ UPSs include a variable-voltage transformer which can adjust to the overvoltage and under-voltage events without draining the battery.

Line-interactive

__________ recovery means that if a system fails, it does not fail in a secure state. Instead, an administrator is required to manually perform the actions necessary to implement a secured or trusted recovery after a failure or system crash.

Manual

The Common Criteria includes a section on trusted recovery that is relevant to system resilience and fault tolerance. Specifically, it defines what 4 types of trusted recovery?

Manual recovery, automated recovery, automated recovery without undue loss, and function recovery

________________ usually consist of self-contained trailers or other easily relocated units. These sites include all the environmental control systems necessary to maintain a safe computing environment. Usually configured as cold or warm sites, depending on the DRP plan they are designed to support. Good for supporting small workgroups.

Mobile sites

__________________ agreements are agreements that allow 2 organizations to pledge to assist each other in the event of a disaster by sharing computing facilities or other technological resources.

Mutual Assistance Agreements (MAAs)/reciprocal agreements

The ____________________ is the authority on fire updates/forecasts/etc.

National Interagency Fire Center

______________ are violent occurrences that result from changes in the Earth's surface or atmosphere that are beyond human control. Disaster recovery plans should provide a mechanism for responding to these whether they happen in a predicted fashion or at a moment's notice.

Natural disasters

____________ is when some packets are lost between source and destination, requiring retransmission.

Packet loss

_______________ are a type of DRP testing that involves relocating personnel the alternate recovery site and implementing site activation procedures. The employees relocated to the site perform their disaster recovery responsibilities just as they would for an actual disaster. The only difference is that operations the main facility are not interrupted.

Parallel tests

________________ involves bringing business operations and processes back to a working state.

Recovery

___________ means data transfers are performed in a bulk transfer mode, but they occur on a more frequent basis, usually once every hour and sometimes more frequently. This method transfers copies of the database transaction logs containing the transactions that occurred since the previous bulk transfer (rather than just copying entire database backup files).

Remote journaling

__________ means a live database server is maintained at the backup site. The remote server receives copies of the database modifications at the same time they are applied to the production server at the primary site. The most expensive database backup option.

Remote mirroring

_____________ involves bringing a business facility and environment back to a workable state.

Restoration

________________ are a type of DRP testing where disaster recovery team members are presented with a scenario and asked to develop and appropriate response. Some of these response measures are then tested. This may involve the interruption of noncritical business activities and the use of some operational personnel.

Simulation tests

A _____________________ is a unique tool used to protect a company against the failure of a software developer to provide adequate support for its products or against the possibility that the developer will go out of business and no technical support will be available for the product. Good for organizations using a lot of custom software. Under this kind of arrangement, the developer provides copies of the application source code to an independent third-party organization that maintains updated backup copies of the source code in a secure fashion.

Software escrow arrangement

_____________ refers to the ability of a system to maintain an acceptable level of service during an adverse event. Sometimes also refers to the ability of a system to return to a previous state after an adverse event. Implies that the failover cluster can fail back to the original server after the original server is repaired

System resilience

What does a 500-year flood plain mean?

The chances of a flood in a given year are 1/500

_____________ provides assurances that after a failure or crash, the system is just as secure as it was before the failure or crash occurred.

Trusted recovery

____________ contain the equipment and data circuits necessarily to rapidly establish operations in the event of a disaster. The systems are usually preconfigured, but they typically do not contain copies of the client's data. Typically takes about 12 hours to activate.

Warm sites

If property insurance includes an __________________ clause, then your damaged property will be compensated based on the fair market value of the items on the date of loss less all accumulated depreciation since the time of their purchase.

actual cash value (AVC)

An ___________________ can be used when the primary site is unavailable in the event of a disaster.

alternate processing site

A long-term decrease in voltage is called a _______________

brownout

A ______________ RAID requires the system to be powered down to replace a faulty drive.

cold swappable

Any event that stops, prevents, or interrupts an organization's ability to perform its work task is considered a ___________.

disaster

A _______________ is implemented in severe situation, such as a hurricane, fire, terrorist attack, etc. It should be able to "run on autopilot", meaning that it is designed to reduce decision-making activities and just a "this is what you do in this situation" type of plan.

disaster recovery plan (DRP)

Now that disk storage is cheap and up to terabytes in size, tape and optical media can't cope with data volume requirements anymore. Many enterprises now use ______________ backup solutions for some portion of their disaster recovery strategy as a result of this.

disk-to-disk (D2D)

A ______________ system will fail in an open state, granting all access.

fail-open

A ____________ electronic lock will be unlocked when the power is removed.

fail-safe

In the context of physical security with electric hardware locks, what two terms are used to describe the ways the lock can react when power is removed?

fail-safe and fail-secure

A ___________ electronic lock will remain locked when the power is removed.

fail-secure

A ___________ system will default to a secure state in the event of a failure, blocking all access.

fail-secure

The process of a server in a cluster taking over the load for a failed server automatically is called ___________.

failover

Fault tolerance can be added for critical servers with _______________. These include 2 or more servers, and if one of the servers fails, another server in the cluster can take over its load automatically.

failover clusters

The first element of the recovery process is _______________. This includes system resilience and fault-tolerant methods in addition to a reliable backup solution.

failure preparation

Tape rotation strategies can be implemented manually or automatically by using either commercial backup software or a fully automated __________________ system. This system consists of 32 or 64 optical or tape backup devices and all drive elements within it are configured as a single drive array (like RAID).

hierarchical storage management (HSM)

A _____________ is a standby facility that is maintained in constant working order, with a full complement of servers, workstations, and communications links ready to assume primary operations responsibilities. Servers and workstations are all preconfigured and loaded with appropriate OS's, applications, etc.

hot site

Most hardware-based RAID systems support ________________ allowing technicians to replace failed discs without powering off the system.

hot swapping

The ____________ DRP test is simple but critical. You distribute copies of the DRP to members of the disaster recovery team for review. Let's you ensure that key personnel are aware of their responsibilities and have that knowledge refreshed, provides individuals the opportunity to review the plans for obsolete information and update it, and identify situations in which key personnel have left the company and nobody bothered to reassign their disaster recovery responsibilities.

read-through test

A common way that fault tolerance and system resilience is added for computers is with a _________________________. This includes 2 or more disks, and most configurations will continue to operate even after one of the disks fails.

redundant array of disks (RAID) array

The ____________ of backup tapes is the frequency of backups and retention length of protected data.

rotation cycle

A power ________ is a quick instance of a reduction in voltage.

sag

A _____________ is a company that leases computer time. They own large server farms and often fields of workstations. Any organization can purchase a contract with one of these to consume some portion of their processing capacity. Can be on site or remotely accessed.

service bureau

A ______________ is any component that can cause an entire system to fail.

single point of failure

A power _________ is a quick instance of an increase in voltage.

spike

A __________________ DRP test, often called a table-top exercise, has members of the disaster recovery team gather in a large conference room and role-play a disaster scenario.

structured walk-through

A long-term increase in voltage is called a power __________

surge

The second element of the recovery process is __________.. The system should be forced to reboot into a single-user, non-privileged state, meaning that the system should reboot so that a normal user account can be used to log in and that the system does not grant unauthorized access to users.

system recovery

Occasionally, power lines have noise on them called _______________ that can come from many different sources.

transients

Software escrow agreements specify ______________ such as the failure of the developer to meet the terms of an SLA or the liquidation of the developer's firm. When these take place, the 3rd party defined in the escrow agreement releases copies of the application source code to the end user.

trigger events

Critical business systems are often protected by ____________________ devices to keep them running at least long enough to shut down or long enough to get emergency response generators up and working.

uninterruptible power supply (UPS)


संबंधित स्टडी सेट्स

hesi evolve questions (endocrine, neuro)

View Set

Marketing Final Pearson Warm ups

View Set

4.6 Robots in Automated Production

View Set

Intro to Sociology - Quiz 2 Chapters 3 & 4

View Set

Ch 53 PrepU: Child with Malignancy

View Set

Central and peripheral nervous system

View Set

Excel Module 3 for Intro to Computers4

View Set