IS621 M03 TEST Contingency Strategies for Incident Response, Disaster Recovery, Business Continuity
The primary objective of _________________________ is to ensure that business will be completely restored and quickly get back to the normal state of operations at the primary/alternate site.
Business Resumption plan (BRP)
______________________ is a plan that shows the organization's intended efforts in the event of a disaster couples with the requirement to relocate key business functions to an alternate site until the primary site can be recovered.
Business Resumption plan (BRP)
____________________ uses software to detect the failure of the primary application server & then activate the secondary application server to begin accepting and servicing the incoming requests.
Clustering Services
________________________is a common method used by system administrator to install applications on multiple servers - so that if one fails to provide the necessary services, a secondary system steps up & takes over the role.
Clustering Services
Before a patch, upgrade, or new application is applied to the hot and warm servers, it is first tested on the _______________________ server.
Cold
From mirrored server architecture perspective, ____________________________ server(s) is used as an administrator's test platform and it should be configured identically as the primary and secondary servers.
Cold
The goal of ______________________ is to reduce the impact of a potential security incident by isolating the affected host(s) and preventing spread to other systems on the network.
Containment
_______________________ backup is one of the backup methods that Takes a complete snapshot of organization's system and therefore requires the largest hardware/media for storage as compare to other available backup methods.
Full
What is the difference between a backup and an archive?
A backup is typically a snapshot of data from a specific point in time. The data is considered volatile and subject to change. An archive is long-term storage of a document or data file, usually for legal or regulatory purposes.
Beyond simply identifying what to back up, when to back it up, and how to restore it, what should a complete backup recovery plan include?
A complete backup plan must include answers to the following questions: How will backups be created? Who will be responsible for creation of the backups? How and when will backups be verified so that they are known to be correct and reliable? Who is responsible for the verification of the backup? Where will backups be stored, and for how long? How often will the backup plan be tested? When will the plan be reviewed and revised? How often will the plan be rehearsed, and who will take part in the rehearsal?
What is encompassed in a differential backup?
A differential backup is the storage of all files that have changed or been added since the last full backup.
What is encompassed in a full backup?
A full backup is just that—a complete backup of the entire system, including all applications, operating systems components, and data.
What is a retention schedule?
A retention schedule is a plan for how long to retain access to each type of backup media and each form of backup (complete, periodic, or partial—incremental or differential).
What is encompassed in an incremental backup?
An incremental backup only archives the files that have been modified since the last incremental backup.
__________________________ is an on-demand service model that provides storage capability for data backup and for data archiving.
Storage as a Service (STaaS)
What purpose does a business resumption plan serve?
The business resumption plan seeks to resume normal operations quickly or expedite continuity plans to quickly initiate operations at an alternate site until normal operations can resume at the primary site.
How have cloud computing architectures impacted the backup options available for organizations?
The emergence of cloud computing has seen a number of more accessible and more affordable off-site, real-time backup solutions than what existed previously. Although concerns about third-party control of critical information assets are not fully resolved, cloud computing does offer more varied solutions for consideration.
What is the primary site?
The primary site is the location or group of locations at which the organization executes its functions.
What are the major types of backups?
There are three basic backup options: full, differential, and incremental.
According to the best practices for data protection, Critical data should be backed up in as close to real time as possible.
True
According to the best practices for data retention, critical data (e.g., financial records) is required by law to be retained and stored for years.
True
According to the best practices for data retention, data that is not covered by laws/regulations may even be in the organization's best interest to quickly destroy to avoiding liability.
True
As part of data backup and recovery plan, the person/team responsible for data backup should be fully trained on the software and/or methodology for creating backup.
True
BCP is often focused on the business processes supported by the technical infrastructure and how to maintain business functionality using resources that are alternatives to this infrastructure.
True
DRP is primarily focused on recovering the organization's technical capabilities, usually in the context of primary infrastructure.
True
Data backup is the duplication of system data to external media or a secondary location to provide recovery capability in the vent of data loss.
True
Data mirroring is an efficient way to track and maintain recent changes whereas backup is mainly used for preserving an already consolidated set of data for long term.
True
Data mirroring software differs from backup such that it involves creating copies of files in real time rather than periodically scanning and updating changes to data at rest to a different location.
True
Determining how to classify your data will depend on your industry and the type of data your organization collects, uses, stores, processes, and transmits. (
True
If hot server goes down, the warm server takes over as the hot server and the cold server can be added as a new warm server while the hot server is taken offline for repair.
True
Once the data has backed up, it is important to verify the backup, check its integrity, and test the data for recovery.
True
Organizations should be aware of regulations associated with the use of certain encryption algorithms, especially if their data is stored outside the U.S.
True
The later phases of IRP ensure that business will keep functioning even in the presence of a real attack.
True
The main advantage of differential backups is that when data needs to be restored it can be built from the full backup and the latest differential copy.
True
The use of clustering services for application recovery allows us to install applications on multiple servers, so that if one fails to provide service, a secondary system steps up and takes over the role
True
Use of bare metal recovery applications with a routine backup allows the recovery of entire servers quickly and easily.
True
When Incident Response plan (IRP) is not able to contain and resolve an incident, CP moves to the DRP & BCP to deal with the intrusion.
True
From mirrored server architecture perspective, ____________________________ server(s) is used as a secondary server which provides services if primary server is busy/down.
Warm
According to the best practices for data protection, nonessential files and applications should be backed up _____________________
Weekly
______________________ list and describes all the steps that should be taken to implement critical business functions at an alternate site until normal operations can be resumed at the primary site.
Business Continuity plan (BCP)
What are the two major components of BRP, and how are they related?
BRP is made up of DRP and BCP. DRP is responsible for recovery of operations at the primary site, and BCP focuses on the need to initiate and operate business functions at alternate sites when they are needed.
The question "What method of data backup should be used" should be answered by the CPMT while documenting ________________________ part of the data backup and recovery plan.
Backup Creation
In data backup and recovery plan, checking the integrity of the backup data and archive is one of the steps that should be performed under ________________________
Backup Verification
In data backup and recovery plan, periodically accessing the copy of the backup and testing it to see if the data is recoverable is one of the steps that should be performed under ________________________
Backup Verification
An alternate technique to recover servers is called ________________________
Bare Metal Recovery
_________________ allows an administrator to reboot the affected system from a remote drive or recoverable media and restore the entire set of system software.
Bare Metal Recovery
________________________ technologies designed to replace O.S., applications, and data when they fail.
Bare Metal Recovery
According to the best practices for data protection, less important data files and critical system files should be backed up______________
Daily
_______________________involves the long-term storage of a document or data file to external media or a secondary location , usually for legal or regulatory purposes.
Data Archive
_______________________ involves making a copy or snapshot of the data at a given point-in-time to external media or a secondary location to provide recovery capability in the event of data loss.
Data Backup
______________________ uses different methods (e.g., disk/tape, online/cloud etc.) to back up the business-critical data that can be quickly recovered in case of an unexpected incident.
Data Protection
_______________________ is the restoration of data from a regular backup or data archive to a system/application/user who needs it.
Data Recovery
__________________________ is an on-demand service model that provides storage capability for data, data sets, and databases associated with the organization's applications.
Data as a Service (DaaS)
__________________________ is the process of separating data into relevant groups based on their shared characteristics such as their level of sensitivity and the risks they present, and the compliance regulations that protect them.
Data classification
A __________________ backup method backs up only the files that changed since the last full back.
Differential
In __________________, the existing data is compared each time with the last full backup, and the difference is uploaded.
Differential
Let's say you did a full backup on Sunday. On Monday, you check the files against the Sunday backup and upload the changed ones. On Tuesday, you check the files against the Sunday backup and upload the changed ones, and so on. What you think which backup method we are using here
Differential backup strategy
__________________________ is an on-demand service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment and provide all the data recovery mechanisms to regain access to data and functionality to IT infrastructure after a disaster.
Disaster Recover as a Service (DRaaS)
______________________ list and describes all the steps that must be taken to resume the normal operations at the primary site of the business.
Disaster Recovery plan (DRP)
________________ is a backup method that uses bulk batch transfer of data to an off-site facility over Internet connections.
E-vaulting
The question "Who will have access to the decryption keys?" should be answered by the CPMT while documenting ________________________ part of the data backup and recovery plan.
Encryption
The "full backup" method requires the same hardware/media to store "backup-data" as compare to "differential backup" method.
False
From mirrored server architecture perspective, ____________________________ server(s) is the online primary server (i.e., domain controller) which provides services to support operations.
Hot
_________________________ focuses on detecting, evaluating, & reacting to an incident
Incident Response plan (IRP)
In __________________ backup method, the data restoration process requires to access the full backup as well as all the incremental copies, which can be time-consuming.
Incremental
In __________________ backup method, you only back up those files that have changed since the last backup.
Incremental
In __________________, the existing data is compared with the last backup activity, and the changed data is uploaded.
Incremental
For example, you did a full backup on Sunday, and on Monday, you check the files against the Sunday backup and upload the changed ones. On Tuesday, you check the files against the Monday backup and upload the changed ones, and so on. What you think which backup method we are using here
Incremental backup strategy
__________________________ is a cloud computing service model in which computing resources (e.g., computer systems, OS, applications) are made available for whatever the organization wants to implement.
Infrastructure as a Service (IaaS)
________________ is a process of duplicating server data storage (exact copy) by writing and storing it to multiple hard drives which may be located on the local or a remote system.
Mirroring
__________________________ is a cloud computing service model in which development platform are made available to developers.
Platform as a Service (PaaS)
For ______________________, we use advanced techniques such as mirroring that protects organization's critical data and critical components of IT infrastructure close to real-time.
Real-time protection
________________ method is used for transferring (real-time) copies of the database transaction logs containing the transactions that occurred since the previous bulk transfer.
Remote journaling (Rj)
__________________________is an organization's established policy to describe requirements for data retention, including what must be retained, where it will be stored, and for how long, and the method of disposal.
Retention Schedule
__________________________ is a cloud computing service model in which applications are made available to the end-users over the Internet.
Software as a Service (SaaS)