Multiple choice questions
Chap -14
QUESTION 1
1. What occurs when steps and procedures are taken that are outside the scope of the DRP?
|
|
enhanced protection |
|
|
waste of resources |
|
|
slow recovery |
|
|
loss of CBFs |
0.10000 points
QUESTION 2
1. DR occurs after a ________.
|
|
disaster |
|
|
BIA |
|
|
BCP |
|
|
test |
0.10000 points
QUESTION 3
1. The goal of backing up data is to be able to store it at an off-site location in case something compromises the original data.
True
False
0.10000 points
QUESTION 4
1. A key difference between a BCP and a DRP is that a DRP does not need to be tested.
True
False
0.10000 points
QUESTION 5
1. RTOs identify when a system must be recovered.
True
False
0.10000 points
QUESTION 6
1. CBFs support _________.
|
|
CSFs |
|
|
mission-critical data |
|
|
DRPs |
|
|
mission-critical operations |
0.10000 points
QUESTION 7
1. A warm site is a compromise between a hot site and a cold site.
True
False
0.10000 points
QUESTION 8
1. When considering options and needs for your alternate location, you should consider and address access for all of the following, EXCEPT:
|
|
customer |
|
|
management |
|
|
user |
|
|
vendor |
0.10000 points
QUESTION 9
1. Changes in an organization cannot affect CBFs.
True
False
0.10000 points
QUESTION 10
1. By addressing CBFs, DRPs help ensure that critical servers and services continue.
True
False
0.10000 points
QUESTION 11
1. A phone tree is a(n) __________________________.
|
|
list of contacts that a DRP coordinator must inform in the event of a disaster or disruption |
|
|
alternate name for a cell tower, which may be damaged during a disaster and result in a loss of communication |
|
|
method to facilitate calling a large group of people |
|
|
alternate name for a landline service provider, which may be damaged during a disaster and result in a loss of communication |
0.10000 points
QUESTION 12
1. A redundant backup site is _______________.
|
|
hosted by a third-party vendor |
|
|
a compromise between a hot site and a cold site |
|
|
another term for the off-site storage of copies of backups |
|
|
an outdated type of site |
0.10000 points
QUESTION 13
1. A major tropical storm hits your area of business and creates a flood that destroys several servers containing vital data as well as all the backups of that data in that location. But, thanks to your DRP, you are able to restore the data. How is this possible?
|
|
DRP developers deploy a team of SMEs to re-create the data. |
|
|
The backup policy specified storing backups off-site. |
|
|
DRP developers are trained to re-create data based on their knowledge of the organization. |
|
|
The backup policy specified steps to restoring damaged servers in the event of a disaster. |
0.10000 points
QUESTION 14
1. What is the primary resource that management provides for the DRP?
|
|
an overall vision |
|
|
funds |
|
|
data |
|
|
labor |
0.10000 points
QUESTION 15
1. Sustaining business operations is a concern for BCPs and not DRPs, because BCPs focus on business continuity, while DRPs solely focus on the recovery process.
True
False
0.10000 points
QUESTION 16
1. What communication elements are important to the success of a DRP?
|
|
recovery, sustaining business operations, and normalization |
|
|
the reason for planning, recognition of disaster/disruption, reaction to disaster/disruption, recovery from disaster/disruption, restoration of CBFs, return to normal operations, rest and relaxation time for responders, and re-evaluation and re-documentation of how to improve the DRP in case of another incident |
|
|
hardware, software, data, and connectivity |
|
|
recall, users, customers, and a communication plan |
0.10000 points
QUESTION 17
1. The eight Rs of recovery planning are: reason for planning, recognition, reaction, recovery, restoration, return to normal, rest and relax, and re-evaluate and re-document.
True
False
0.10000 points
QUESTION 18
1. Performing backups of critical data is an integral part of any recovery plan.
True
False
0.10000 points
QUESTION 19
1. Choose the accurate list of alternate terms for a DRP.
|
|
continuity planning; business interruption planning; corporate contingency planning; business impact planning; fault tolerance; disaster preparedness |
|
|
contingency planning; business continuity planning; corporate continuity planning; fault tolerance; disaster preparedness; system recovery planning |
|
|
CBF; MAO; RTO; BIA; BCP; DAT; TRT; EMT |
|
|
contingency planning; business resumption planning; corporate contingency planning; business interruption planning; disaster preparedness |
0.10000 points
QUESTION 20
1. Electronic vaulting is a method that transfers the backup of data to an off-site location.
True
False
1. Using the 2nd Project Template and the weaknesses identified in the 1st column of the template complete the Threats, Risks, and Controls/Countermeasures that correspond to each weakness.
· More than one Threat and/or one Risk and/or one Control/Countermeasure can exist for each weakness.
· Do not include the Data Centers because they are owned by 3rd party vendors who maintain their own Risk Management plan.
Your grade will be based on the information provided in the 2nd Project Information document and 1st column of the template. You may be able to use the Risk Management items from the Group project that apply to this scenario but do not add any new weaknesses to the template.
NOTE: one of the issues I discovered in the Group project was that some Threats were listed as Risks; some Risks as Threat, etc. Make sure you understand these terms.
A Weakness is something that violates an existing (or potential) policy/procedures
A Threat is a danger that exploits the Weakness
A Risk involves the loss/impact of a tangible or intangible asset (Quantitative/Qualitative)
A Countermeasure reduces/eliminate the Threat/Loss