Search Header Logo
Security+ Module 14:  Disaster Planning and Recovery

Security+ Module 14: Disaster Planning and Recovery

Assessment

Presentation

Computers

Professional Development

Medium

Created by

Gil Gallant

Used 5+ times

FREE Resource

89 Slides • 16 Questions

1

Security+ Module 14:

Disaster Planning and Recovery

By Mr. Gallant

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

media

12

media

13

media

14

Multiple Choice

What document specifically covers moving operations to a temporary site? Choose the best response.

1

BCP

2

BIA

3

COOP

4

DRP

15

Multiple Choice

Which document is a business most likely to have more than one of? Choose the best response.

1

BCP

2

BIA

3

COOP

4

DRP

16

Multiple Choice

What is also known as a “structured walkthrough?” Choose the best response.

1

Checklist test

2

ISCP

3

Simulation test

4

Tabletop exercise

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

media

34

media

35

media

36

media

37

media

38

media

39

media

40

media

41

media

42

media

43

media

44

media

45

media

46

media

47

media

48

Multiple Select

Which of the following RAID levels incorporates disk striping? Select all that apply.

1

RAID 0

2

RAID 1

3

RAID 5

4

RAID 10

49

Multiple Choice

The process of rebuilding a RAID drive from parity data can cause a RAID drive to fail. True or false?

1

True

2

False

50

Multiple Choice

If you have a RAID implementation with data parity, you don’t need data backups. True or false?

1

True

2

False

51

Multiple Choice

You have a critical database server that continuously backs its files up to the cloud. Still, its software environment is so finicky that if it encountered a critical failure, it would take a long time to get it working again. How would you describe your recovery plan for that service? Choose the best response.

1

High RPO and high RTO

2

High RPO and low RTO

3

Low RPO and high RTO

52

Multiple Choice

Clustering is similar to load balancing but tends to use tighter integration between redundant systems. True or false?

1

True

2

False

53

Multiple Choice

Your company rents a spare server room in a secondary location. It has all the necessary hardware, software, and network services, so you can load backups and take over. What is it? Choose the best response.

1

Hot site

2

Hot spare

3

Cold site

4

Cold spare

54

Multiple Choice

In terms of time, how does a differential backup plan generally differ from an incremental backup plan? Choose the best response.

1

It’s slower to create backups, but quicker to restore data

2

It’s quicker both to create backups and to restore data

3

It’s quicker to create backups, but slower to restore data

4

It’s slower both to create backups and to restore data

55

Multiple Choice

What backup type might require specific operating system support? Choose the best response.

1

Differential

2

Full

3

Incremental

4

Snapshot

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

media

77

media

78

media

79

media

80

media

81

media

82

media

83

media

84

media

85

media

86

media

87

media

88

media

89

media

90

media

91

media

92

media

93

media

94

media

95

media

96

media

97

media

98

media

99

media

100

Multiple Choice

Order the steps of the incident response process.

1

Preparation, Identification, Containment, Investigation, Eradication, Recovery, Follow up

2

Identification, Preparation, Containment, Investigation, Eradication, Recovery, Follow up

3

Identification,

Containment, Preparation, Investigation, Eradication, Recovery, Follow up

4

Preparation,

Eradication, Identification, Containment, Investigation, Recovery, Follow up

101

Multiple Choice

What is eDiscovery? Choose the best response.

1

A process for sharing electronic forensic data.

2

A process for identifying security incidents.

3

A standard for forensic backup software.

4

  A software application used to track security incidents.

102

Multiple Choice

You should start choosing an incident response team as soon as you’ve identified an incident. True or false?

1

True

2

False

103

Multiple Choice

After a security incident, you rush to take a screenshot of a telltale running process before you leisurely take a backup of suspicious files on the hard drive. What forensic principle are you exercising? Choose the best response.

1

Order of volatility

2

eDiscovery

3

Chain of custody

4

Audit trail

104

Multiple Choice

Why is it important to record time offsets when collecting evidence? Choose the best response.

1

To compensate for logging systems that don’t record precise times

2

To compensate for time differences between multiple systems

3

To document the precise order of events

4

To document the precise timing of events

105

media

Security+ Module 14:

Disaster Planning and Recovery

By Mr. Gallant

Show answer

Auto Play

Slide 1 / 105

SLIDE