8.8. Review Questions

  1. Which plan or policy helps an organization determine how to relocate to an emergency site?

    1. Disaster-recovery plan

    2. Backup site plan

    3. Privilege management policy

    4. Privacy plan

  2. Although you're talking to her on the phone, the sound of the administrative assistant's screams of despair can be heard down the hallway. She has inadvertently deleted a file that the boss desperately needs. Which type of backup is used for the immediate recovery of a lost file?

    1. Onsite storage

    2. Working copies

    3. Incremental backup

    4. Differential backup

  3. Which system frequently has audit files/transaction logs that can be used for recovery?

    1. Database system

    2. Application server

    3. Backup server

    4. User system

  4. You're trying to rearrange your backup procedures to reduce the amount of time they take each evening. You want the backups to finish as quickly as possible during the week. Which backup system backs up only the files that have changed since the last backup?

    1. Full backup

    2. Incremental backup

    3. Differential backup

    4. Backup server

  5. Which backup system backs up all the files that have changed since the last full backup?

    1. Full backup

    2. Incremental backup

    3. Differential backup

    4. Archival backup

  6. You're a consultant brought in to advise MTS on its backup procedures. One of the first problems you notice is that the company doesn't utilize a good tape-rotation scheme. Which backup method uses a rotating schedule of backup media to ensure long-term information storage?

    1. Grandfather, Father, Son method

    2. Full Archival method

    3. Backup Server method

    4. Differential Backup method

  7. Which site best provides limited capabilities for the restoration of services in a disaster?

    1. Hot site

    2. Warm site

    3. Cold site

    4. Backup site

  8. You're the head of information technology for MTS and have a brother in a similar position for ABC. Both companies are approximately the same size and are located several hundred miles apart. As a benefit to both companies, you want to implement an agreement that would allow either company to use resources at the other site should a disaster make a building unusable. What type of agreement between two organizations provides mutual use of their sites in the event of an emergency?

    1. Backup-site agreement

    2. Warm-site agreement

    3. Hot-site agreement

    4. Reciprocal agreement

  9. The process of automatically switching from a malfunctioning system to another system is called what?

    1. Fail safe

    2. Redundancy

    3. Fail-over

    4. Hot site

  10. You've been brought in as a temporary for FRS, Inc. The head of IT assigns you the task of evaluating all servers and their disks and making a list of any data not stored redundantly. Which disk technology isn't fault tolerant?

    1. RAID 0

    2. RAID 1

    3. RAID 3

    4. RAID 5

  11. Which agreement outlines performance requirements for a vendor?

    1. MTBF

    2. MTTR

    3. SLA

    4. BCP

  12. Your company is about to invest heavily in an application written by a new startup. Because it is such a sizable investment, you express your concerns about the longevity of the new company and the risk this organization is taking. You propose that the new company agree to store its source code for use by customers in the event that it ceases business. What is this model called?

    1. Code escrow

    2. SLA

    3. BCP

    4. CA

  13. Which policy describes how computer systems may be used within an organization?

    1. Due care policy

    2. Acceptable-use policy

    3. Need-to-know policy

    4. Privacy policy

  14. You're the administrator for STM and have been summoned to an unannounced audit. The auditor states that he is unable to find anything in writing regarding confidentiality of customer records. Which policy should you produce?

    1. Separation-of-duties policy

    2. Due care policy

    3. Physical access policy

    4. Document destruction policy

  15. Which policy dictates how an organization manages certificates and certificate acceptance?

    1. Certificate policy

    2. Certificate access list

    3. CA accreditation

    4. CRL rule

  16. You're giving hypothetical examples during a required security training session when the subject of certificates comes up. A member of the audience wants to know how a party is verified as genuine. Which party in a transaction is responsible for verifying the identity of a certificate holder?

    1. Subscriber

    2. Relying party

    3. Third party

    4. Omni registrar

  17. Which of the following would normally not be part of an incident-response policy?

    1. Outside agencies (that require status)

    2. Outside experts (to resolve the incident)

    3. Contingency plans

    4. Evidence collection procedures

  18. MTS is in the process of increasing all security for all resources. No longer will the legacy method of assigning rights to users as they're needed be accepted. From now on, all rights must be obtained for the network or system through group membership. Which of the following groups is used to manage access in a network?

    1. Security group

    2. Single sign-on group

    3. Resource sharing group

    4. AD group

  19. Which process inspects procedures and verifies that they're working?

    1. Audit

    2. Business continuity plan

    3. Security review

    4. Group privilege management

  20. The present method of requiring access to be strictly defined on every object is proving too cumbersome for your environment. The edict has come down from upper management that access requirements should be reduced slightly. Which access model allows users some flexibility for information-sharing purposes?

    1. DAC

    2. MAC

    3. RBAC

    4. MLAC

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.139.104.214