Shared Data & Disaster Recovery

Shared Data & Disaster Recovery

11th Grade

15 Qs

quiz-placeholder

Similar activities

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

1 OCR GCSE Computer Science - Fetch Decode Execute

1 OCR GCSE Computer Science - Fetch Decode Execute

10th - 11th Grade

17 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

Latihan PAS Informatika

Latihan PAS Informatika

10th - 12th Grade

15 Qs

IT Policies

IT Policies

9th - 11th Grade

13 Qs

Implications of data use on computer systems

Implications of data use on computer systems

9th - 12th Grade

10 Qs

Security Disaster Recovery

Security Disaster Recovery

11th Grade

14 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

Shared Data & Disaster Recovery

Shared Data & Disaster Recovery

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Aaron Stewart

Used 103+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the disaster recovery policy?

Preventing cybersecurity incidents from occurring.

Ensuring damage is quickly recovered from after an incident.

Performing regular backups of all data.

Analysing the cause of attacks and identifying improvements to procedures.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of threats can disaster recovery policies help to protect us from being impacted by?

Natural disasters

Malware

Hardware failure

All of the above.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A “hot site” is a location that a business can instantly switch business operation over to after a disaster.

True

False

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following would be included in a disaster recovery policy?


Choose two options.

Establishing the severity of the attack

Definition of the backup process

Analysis of the cause of the disaster

Timeline for data recovery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action to take after an attack is described below?


Establish the cause of the attack and mistakes made and update policies and procedures.

Respond

Manage

Recover

Investigate

Analyse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action to take after an attack is described below?


Identify when and why the attack happened and establish the severity of the attack.

Respond

Manage

Recover

Investigate

Analyse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action to take after an attack is described below?


Implement the disaster recovery policy.

Respond

Manage

Recover

Investigate

Analyse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?