info 12

Ace your homework & exams now with Quizwiz!

Which of the following types of penetration testing focuses on the system, using techniques such as port scans, traceroute information, and network mapping to find weaknesses?

Active reconnaissance

Which of the following is a reversion from a change that had negative consequences?

Backout

The process of automatically switching from a malfunctioning system to another system is called what?

Failover

According to CERT, which of the following would be a formalized or an ad hoc team you can call upon to respond to an incident after it arises?

CSIRT

Which of the following would normally not be part of an incident response policy?

Contingency plans

Which of the following types of vulnerability scans uses actual network authentication to connect to systems and scan for vulnerabilities?

Credentialed

Your company is about to invest heavily in a new server farm and have made an attractive offer for a parcel of land in another country. A consultant working on another project hears of this and suggests that you get the offer rescinded because the laws in that country are much more stringent than where you currently operate. Which of the following is the concept that data is subject to the laws of where it is stored?

Data sovereignty

Which backup system backs up all the files that have changed since the last full backup?

Differential backup

Which plan or policy helps an organization determine how to relocate to an emergency site?

Disaster-recovery plan

Which process involves consulting policies and determining how best to conduct an investigation into the incident?

Escalation

Which backup type is a complete, comprehensive backup of all files on a disk or server?

Full

Which of the following is a concept that works on the assumption that any information created on any system is stored forever?

Full archival

A method that works on the assumption that any information created on any system is stored permanently is known as which of the following?

Full archival method

You're a consultant brought in to advise MTS on its backup procedures. One of the first problems you notice is that the company doesn't use a good tape-rotation scheme. Which backup method uses a rotating schedule of backup media to ensure long-term information storage?

Grandfather, Father, Son method

In which type of testing do testers perform with some limited knowledge of the target system?

Gray box

Which backup type uses optical or tape jukeboxes for providing continuous online backups?

HSM

Which of the following is a newer backup type that provides continuous online backup by using optical or tape jukeboxes and can be configured to provide the closest version of an available real-time backup?

HSM

Which of the following is the most expensive recovery site?

Hot

Which recovery site is described in the statement given below?"A location that provides operations within hours of a failure"

Hot

You're trying to rearrange your backup procedures to reduce the amount of time they take each evening. You want the backups to finish as quickly as possible during the week. Which backup system backs up only the files that have changed since the last backup?

Incremental backup

Which type of penetration-style testing involves actually trying to break into the network?

Intrusive

Which of the following is the process used during data acquisition for the preservation of all forms of relevant information when litigation is reasonably anticipated?

Legal hold

What is the last step performed in the incident response process?

Lessons learned

A level of testing that starts up all backup systems but leaves the main systems functioning is described as which of the following?

Parallel test

Karl is conducting penetration testing on the Pranks Anonymous servers and having difficulty finding a weakness. Suddenly, he discovers that security on a different company's server—a vendor to Pranks Anonymous—can be breached. Once he has compromised the completely different company's server, he can access the Pranks Anonymous servers and then launch an attack. What is this weakness/exploit known as?

Pivot

You're the head of information technology for MTS and have a brother in a similar position for ABC. The companies are approximately the same size and are located several hundred miles apart. As a benefit to both companies, you want to implement an agreement that would allow either company to use resources at the other site should a disaster make a building unusable. What type of agreement between two organizations provides mutual use of their sites in the event of an emergency?

Reciprocal agreement

What is another name for working copies?

Shadow copies

Which site best provides limited capabilities for the restoration of services in a disaster?

Warm site

Although you're talking to her on the phone, the sound of the administrative assistant's screams of despair can be heard down the hallway. She has inadvertently deleted a file that the boss desperately needs. Which type of backup is used for the immediate recovery of a lost file?

Working copies

The process of identifying what has occurred on a system by examining the data trail is known as:

forensic


Related study sets

Logical Fallacies in The Crucible

View Set

Conducting Psychology Research in the Real World

View Set

S66 Part 2 - Economic Factors and Business Information

View Set

AP Stat Unit 3 Progress Check: MCQ Part A

View Set

SWG Resp Exam 1: Mechanisms of Breathing (SL/P900)

View Set

Compiler Theory and Design: Week 3 Lecture Videos

View Set

IGGY - Ch. 56: IBS and Colorectal Cancer

View Set