Joan was conducting a particular disaster recovery test in her startup. In this test, the effectiveness, bottlenecks, or any weaknesses in the plan had to be confirmed by the team members. Which test was Joan conducting?
Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?
Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?
Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?
Matt is the security advisor for a global online stock brokering organization. He wants to back up his organization’s critical data but is faced with a challenge. Due to the real-time data updating nature of his organization’s business, he cannot have any downtime for his systems to back them up. Which of the following backup techniques can help Matt overcome this challenge?
The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?
Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:
It has a parity check to store all the information about the data in multiple drives.
Help reconstruct the data during downtime.
Process the data at a good speed.
Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?
Which of the following terms refers to a holistic management process that identifies potential threats to an organization and its impacts on business operations? It further provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand, and value-creating activities?
XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?
Using which feature of Windows 10 can users preserve the state of the systems including the important system files, installed applications, and system settings?
Martin works as a network administrator in a company. He recently created an FTP server and wants to take the backup of the configuration of his Cisco Router on the FTP server. Which Cisco IOS CLI (Command Line Interface) command can help him do this?
Which of the following clusters uses mounted file systems to read and write data?
Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?
Jack wanted to transfer his startup’s data to a secure backup site. Since cost was a huge factor for him, one of his friends suggested that he should rent a server for his data from the same data center that his friend used for his organization’s needs. This physical site provided cooling facilities and was cheaper as compared to other backup sites. Which of the following backup sites did Jack opt for?
ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?
Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?
Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?
Due to the occurrence of a disaster, the data and applications at Phil’s organization were lost. Fortunately, Phil had invested in a disaster recovery tier. This disaster recovery tier provided Phil with automated recovery of data and applications. Which disaster recovery tier did Phil invest in?
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.
Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?
Which of the following is a standard on disaster/emergency management and business continuity programs that specifically defines disasters and provides provisions to cover the development, implementation, assessment, and maintenance of programs for prevention, mitigation, preparedness, response, continuity, and recovery?
Jonah recently adopted a method to back up his data to an external hard disk. He noticed that his laptop was creating a new backup daily, and each backup was taking up more storage space than the previous one. Which type of backup is Jonah’s computer creating daily?
Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?
What is the name of the shared directory in the Microsoft Server OS, which contains the copy of commonly shared and replicated public files of that particular domain?
Fred, the owner of an organization, wanted to implement a plan that consists of well-planned actions to be adopted before, during, and after a catastrophic event. Which plan did Fred want to implement?
Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?
Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?
Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:
Very High
High
Medium
Low
Very LowWhich assessment method did Jonathan use to perform the risk assessment?
Which of the following terms refers to a high-speed data transmission technique that provides access to consolidated block-level storage?
Craig runs a back-end support center for a few technology clients. Due to the global nature of his clientele, the operations need to be up 24x7. However, he can afford a downtime of a few days in the event of a disaster owing to the non-emergency nature of the products he supports. He identified a backup site for his operations to which he can switch in case his primary site of business is rendered defunct by a disaster. Since he has the buffer of a few days, he decided that he would pre-install the hardware and pre-configure restoration settings at the backup site. This will allow him to get hisoperations up and running within the specified RTO. Which of the following backup sites did Craig go for?
Which of the following options must be considered by an organization when conducting BIA?
Remy had invested $15,000 in an organization that manufactured computer hardware. The investment was risky as it had a 15% chance of failing in the first three months if the organization did not get a specific desired contract. However, this percentage drastically increased to 35% over the same period when an inspection revealed that the manufacturing unit did not have adequate fire safety measures in place. Due to this, the chances of a fire breaking out and destroying the unit were very high. Which method of evaluating the risk has Remy used in this scenario?
Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?
Which of the following is NOT a component of a centralized governance structure for Business Continuity and Risk Management?
Rachel was reviewing the various tiers of disaster recovery so as to implement them in her startup. One particular tier attracted her attention, and she wanted to put it into effect in her startup. This specific disaster recovery tier backed up data over a WAN connection. Which disaster recovery tier did Rachel want to implement in her startup?
Which of the following terms measures the number of applications or data sets handled by the recovery solution and the maximum size of the data it can store?
Cameron wanted to back up the data present on his organization’s server in case a disaster struck and the data was lost. The software he used created a copy of the data using block-level imaging. Which software did Cameron use?
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?
Which of the following refers to a central command and control facility responsible for carrying out recovery actions, coordinating response and resources, and assuring the coherence of operations of an organization?