Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Joan was conducting a particular disaster recovery test in her startup. In this test, the effectiveness, bottlenecks, or any weaknesses in the plan had to be confirmed by the team members. Which test was Joan conducting?

A.

Walkthrough Testing

B.

Full Interruption Testing

C.

Parallel Testing

D.

Simulation Testing

Full Access
Question # 5

Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?

A.

Database Authentication

B.

Database Consolidation

C.

Database Integrity Testing

D.

Backup Integrity Testing

Full Access
Question # 6

Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?

A.

Bare Metal Recovery

B.

System Restore

C.

Mirroring

D.

System Image Recovery

Full Access
Question # 7

Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?

A.

Return

B.

Resume

C.

Reduce

D.

Recover

Full Access
Question # 8

Matt is the security advisor for a global online stock brokering organization. He wants to back up his organization’s critical data but is faced with a challenge. Due to the real-time data updating nature of his organization’s business, he cannot have any downtime for his systems to back them up. Which of the following backup techniques can help Matt overcome this challenge?

A.

Incremental Backup

B.

Cold Backup

C.

Hot Backup

D.

Online Data Backup

Full Access
Question # 9

The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?

A.

Merge Replication

B.

Transactional Replication

C.

SQL Server Replication

D.

Snapshot Replication

Full Access
Question # 10

Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:

    It has a parity check to store all the information about the data in multiple drives.

    Help reconstruct the data during downtime.

    Process the data at a good speed.

    Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

A.

RAID 10

B.

RAID 1

C.

RAID 1 (Duplicate option, likely typo for another level)

D.

RAID 3

Full Access
Question # 11

What is the main objective of a BC test plan?

A.

To demonstrate proficiency in management response and crisis conditions

B.

To ensure the plan is accurate and relevant under adverse circumstances

C.

To diverge from the test storyboard to include unplanned events or circumstances

D.

Not threaten the normal business operations of an organization

Full Access
Question # 12

Which of the following terms refers to a holistic management process that identifies potential threats to an organization and its impacts on business operations? It further provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand, and value-creating activities?

A.

Business Impact Analysis

B.

Risk Management

C.

Business Continuity Management

D.

Disaster Recovery

Full Access
Question # 13

XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?

A.

Work Recovery Time (WRT)

B.

Recovery Time Objective (RTO)

C.

Maximum Tolerable Downtime (MTD)

D.

Recovery Point Objective (RPO)

Full Access
Question # 14

Using which feature of Windows 10 can users preserve the state of the systems including the important system files, installed applications, and system settings?

A.

System Backup

B.

System Restore

C.

System Update

D.

Failover Replication

Full Access
Question # 15

Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?

A.

#backup running-configuration ftp

B.

#backup running-configuration ftp

C.

#copy running-configuration ftp

D.

#copy running-configuration tftp

Full Access
Question # 16

Which of the following clusters uses mounted file systems to read and write data?

A.

Storage Cluster

B.

High-Performance Clusters

C.

Failover Cluster

D.

High-Availability Cluster

Full Access
Question # 17

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

A.

Detailed Awareness Training

B.

Simulation Training

C.

Scenario Training

D.

Introductory Awareness Training

Full Access
Question # 18

Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?

A.

Hot Sites

B.

Cold Sites

C.

Warm Sites

D.

Colocation Facilities

Full Access
Question # 19

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

A.

Recovery Consistency Objective (RCO)

B.

Recovery Object Granularity (ROG)

C.

Recovery Location Scope (RLS)

D.

Recovery Service Resiliency (RSR)

Full Access
Question # 20

Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?

A.

System Migration

B.

System Backup

C.

System Replication

D.

System Recovery

Full Access
Question # 21

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

A.

Disaster Management Team

B.

Disaster Management Executive Committee

C.

Disaster Management Team Chairpersons

D.

Disaster Management Team Coordinators

Full Access
Question # 22

Due to the occurrence of a disaster, the data and applications at Phil’s organization were lost. Fortunately, Phil had invested in a disaster recovery tier. This disaster recovery tier provided Phil with automated recovery of data and applications. Which disaster recovery tier did Phil invest in?

A.

Tier 4

B.

Tier 7

C.

Tier 6

D.

Tier 2

Full Access
Question # 23

Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.

A.

Two drives

B.

Three drives

C.

Four drives

D.

Six drives

Full Access
Question # 24

Which of the following is NOT an advantage of colocation facilities?

A.

Recovery of Servers

B.

Backup

C.

Cooling

D.

Economic Advantages

Full Access
Question # 25

Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?

A.

DAS

B.

NAS

C.

PAS

D.

RAID

Full Access
Question # 26

Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?

A.

NFPA 1600

B.

ISO 27005

C.

INCITS 483-2012

D.

ISO 27031

Full Access
Question # 27

Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?

A.

Differential Backup

B.

Online Data Backup

C.

Incremental Backup

D.

Full System Backup

Full Access
Question # 28

Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?

A.

Deja Dup

B.

Checkpoints

C.

Shadow Copy

D.

Snapshots

Full Access
Question # 29

What is the name of the shared directory in the Microsoft Server OS, which contains the copy of commonly shared and replicated public files of that particular domain?

A.

ADFS

B.

SYSVOL

C.

inetpub

D.

Public Files

Full Access
Question # 30

Fred, the owner of an organization, wanted to implement a plan that consists of well-planned actions to be adopted before, during, and after a catastrophic event. Which plan did Fred want to implement?

A.

Business Recovery Plan

B.

Risk Assessment

C.

IT Disaster Recovery Plan

D.

Data Backup Plan

Full Access
Question # 31

Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?

A.

Simulation Test

B.

Orientation Test

C.

Checklist Test

D.

Tabletop Test

Full Access
Question # 32

Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?

A.

Survivable Storage System

B.

Decentralized Computing

C.

Mirroring

D.

Mainframe Computer System

Full Access
Question # 33

Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:

    Very High

    High

    Medium

    Low

    Very LowWhich assessment method did Jonathan use to perform the risk assessment?

A.

Quantitative Risk Assessment

B.

Semi-Quantitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Qualitative Risk Assessment

Full Access
Question # 34

Which of the following terms refers to a high-speed data transmission technique that provides access to consolidated block-level storage?

A.

Cloud Storage

B.

Network Attached Storage (NAS)

C.

Storage Virtualization

D.

Storage Area Network (SAN)

Full Access
Question # 35

Craig runs a back-end support center for a few technology clients. Due to the global nature of his clientele, the operations need to be up 24x7. However, he can afford a downtime of a few days in the event of a disaster owing to the non-emergency nature of the products he supports. He identified a backup site for his operations to which he can switch in case his primary site of business is rendered defunct by a disaster. Since he has the buffer of a few days, he decided that he would pre-install the hardware and pre-configure restoration settings at the backup site. This will allow him to get hisoperations up and running within the specified RTO. Which of the following backup sites did Craig go for?

A.

Cold Sites

B.

Colocation Facilities

C.

Warm Sites

D.

Hot Sites

Full Access
Question # 36

Which of the following options must be considered by an organization when conducting BIA?

A.

Transferring a business activity to a third-party

B.

Ceasing or changing a business activity if viable alternatives are available

C.

Time scales for assessment

D.

Establishing alternate processes or creating redundancy/spare capacity in processes

Full Access
Question # 37

Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?

A.

Return on Risk Adjusted Capital (RORAC)

B.

Value at Risk

C.

Risk Adjusted Return On Capital (RAROC)

D.

Risk Valuation

Full Access
Question # 38

Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?

A.

Availability

B.

Integrity

C.

Nonrepudiation

D.

Precaution

Full Access
Question # 39

Which of the following is NOT a component of a centralized governance structure for Business Continuity and Risk Management?

A.

Programs and Practices

B.

Enablement

C.

Effectiveness

D.

Authenticity

Full Access
Question # 40

Rachel was reviewing the various tiers of disaster recovery so as to implement them in her startup. One particular tier attracted her attention, and she wanted to put it into effect in her startup. This specific disaster recovery tier backed up data over a WAN connection. Which disaster recovery tier did Rachel want to implement in her startup?

A.

Tier 5

B.

Tier 3

C.

Tier 0

D.

Tier 6

Full Access
Question # 41

Which of the following terms measures the number of applications or data sets handled by the recovery solution and the maximum size of the data it can store?

A.

Recovery Service Scalability (RSS)

B.

Recovery Location Scope (RLS)

C.

Recovery Point Objective (RPO)

D.

Recovery Service Resiliency (RSR)

Full Access
Question # 42

Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?

A.

Cloud Backup

B.

Disk Imaging

C.

Visualization

D.

Bare-metal Restore

Full Access
Question # 43

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

A.

Offsite Backup

B.

Cloud Backup

C.

Onsite Backup

D.

Hot Site Backup

Full Access
Question # 44

Which of the following refers to a central command and control facility responsible for carrying out recovery actions, coordinating response and resources, and assuring the coherence of operations of an organization?

A.

Crisis Command Center

B.

Colocation Facilities

C.

Mobile Recovery Center

D.

Emergency Operations Center

Full Access
Question # 45

Match the following RAID components with their functions:

A.

l-ii.2-i.3-iv.4-iii

B.

l-v,2-iv,3-ii, A-ii

C.

l-iii,2-v3-i,4-iv

D.

l-iv.2-iii,3-v,4-i

Full Access