Intrusion Detection Chapter 3
Database shadowing techniques are generally used in organizations that do not need immediate data recovery after an incident or disaster.
False
For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.
False
____ uses a number of hard drives to store information across multiple drive units.
RAID
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.
SaaS
One real-time protection and data backup strategy is the use of mirroring.
True
RAID is an acronym for Redundant Array of Incident-Recovery Drives.
True
Some data is required by law to be retained and stored for years.
True
A(n) ____ is an agreement in which the client agrees not to use the vendor's services to compete directly with the vendor, and for the client not to use vendor information to gain a better deal with another vendor.
covenant not to compete
____ are used for recovery from disasters that threaten on-site backups.
data archives
RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which data segments are written in turn to each disk drive in the array.
disk striping
An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.
disk-to-disk-to-cloud
A resumption location known as a ____ or a _______ is a fully configured computer facility capable of establishing operations at a moment's notice.
hot site, mirrored site
A ____ is a synonym for a virtualization application.
hypervisor
A(n) ____ backup only archives the files that have been modified since the last backup.
incremental
A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization.
moderate
A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and communications methods to provide an online storage environment.
network-attached storage
A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.
nondisclosure agreement
Considered to be the traditional "lock and copy" approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive.
online backup applications
A(n) ____ is an extension of an organization's intranet into cloud computing.
private cloud
Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and the duration of storage.
retention
Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing backups of data.
robustness
A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.
service agreement
A ____ is an agency that provides physical facilities in the event of a disaster for a fee.
service bureau
A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.
statement of indemnification
A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facility simultaneously.
time-share
When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or on a host platform.
virtual machine