Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?
Which of the following terms refers to the process of utilizing the full backup of a file and then modifying that file with one or more incremental backups?
Jessie was implementing PASIS architecture in her organization in order to keep the organization’s critical data safe, in case a disaster struck. Additionally, she also wanted to prevent unauthorized access of data. After the PASIS architecture was implemented, the critical data was only accessible to the authorized employees. Which feature of PASIS architecture made this possible?
Which of the following terms refers to the recommencement of business functions and operations as the systems are gradually made available after the occurrence of a disaster?
Which of the following terms refers to third-party backup, and offsite replication?
Joan noticed that one of the servers, which she was responsible for, was slowing down due to a spike in traffic. Too many requests came in due to the extra traffic which was eating up all the memory of the server. This meant that the requests had to wait for a longer period of time before they could be processed. This delay was unacceptable to the business; hence, Joan added some extra virtual memory to the server to smooth things out. What is such a feature called?
Which of the following virtualization methods requires a software called containers or virtual engines to run?
Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?
Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decide to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data. Which RAID level is used here?
Richard was a cautious person, and he used to back up his organization’s data daily at 8:00 pm. One day, due to a fire in his office building at 9:00 am, servers containing critical data were destroyed. It would take about 8 hours for Richard’s organization to transfer the backed-up data from the alternate site to the primary site. Based on the last data backup, the recovery time in this scenario is ‘minus 13 hours’. What technical term best defines this time period of 13 hours?
An online betting site accepts bets for sporting events held around the world. Due to this, their operations need to be up 24x7. During an internal IT audit, they discovered a vulnerability in their payment gateway system. They assessed that should the payment gateway go down for more than an hour, they will lose about $100,000 and about 15% of their customers to their competitor website. Moreover, they might lose 25% of their customer base permanently due to the constant promotions run by their competitor to attract and retain new customers. This was unacceptable for the business under any circumstances, so immediate corrective measures were taken to fix the vulnerability. What technical term best defines this time period of two hours?
James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?
Jake was preparing a particular plan for his organization in which all personnel accountable for research, development, and implementation of the disaster recovery plan were being identified. Which plan was Jake preparing for his organization?
Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?
The IT department of ABC Inc. had a practice of storing replicas of the various database servers housed in the organization. One such database server housed the annual sales, profit/loss, revenue, and other such important data of the organization. The IT department did not want to take frequent replicas of that database since it was updated just once a year and frequent replicas would unnecessarily take storage space and eat into the bandwidth of the organization. In this scenario, the IT department decided to copy the data changes from the original database server to a replica database server annually. Which of the following solutions did the IT department implement in this scenario?
Mike is installing a new file server running on the Windows Server 2012 operating system. In order to enable the backup and restoration capabilities of that file server, Mike needs to install a specific feature inside the Windows Server 2012 operating system. Which feature should Mike install by using which built-in Windows Server application?
Which of the following terms refers to those systems that maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems, and user accounts?
Phil, an entrepreneur, is running an important experiment on a virtual machine that may give him a breakthrough in the research for his next product. Unfortunately, while the experiment was being conducted, the virtual machine crashed. Fortunately, Phil had implemented a method that took a backup of the machine at regular intervals and would provide an architectural instance of the last saved version of the virtual machine. Which backup method did Phil implement?
Matt is the security advisor for a global online stock brokering organization. He wants to back up his organization’s critical data but is faced with a challenge. Due to the real-time data updating nature of his organization’s business, he cannot have any downtime for his systems to back them up. Which of the following backup techniques can help Matt overcome this challenge?
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.
Which of the following terms measures the number of applications or data sets handled by the recovery solution and the maximum size of the data it can store?
Tom works as a network administrator in a multinational organization having branches across North America and Europe. He wants to implement a storage technology that can provide centralized datastorage and free data backup on the server. In addition, the selected technology will aid him in performing data backup and recovery more efficiently. Which of the following storage technologies best suits Tom’s requirements?
Which of the following is a feature of mainframe computers?
Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?
Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?
Phoebe was conducting several test cases in her organization for the disaster recovery plan. For the cases to be successful, at least 90% of the test cases must pass. What is this scenario known as?
Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?
Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?
To comply with a certain information security risk management standard, George did an exercise to identify all the risks that his organization faced. He ascertained that his organization was vulnerable to the following risks: phishing emails to the employees of his organization, earthquakes (common for the city in which his office was located), destruction of the organization’s critical data due to the crashing of the primary server, and electrical surges, which in the long term could cause harm to the primary server.The standard demanded that he prioritize these risks before chalking out a plan to deal with them and identify the risk with the highest priority. According to George, electrical surges were the highest priority risk. Which standard is George trying to comply with?
In which disaster recovery tier is data backed up with a hot site?
ABC Inc. has a host of servers, each serving a different purpose. Almost all of them are critical to the functioning of the business. Most of the servers were virtualized and had backup virtual components. Thus, when the memory of one server crashed in the middle of a busy business day, it did not affect the operations as the server quickly switched to a different virtual memory, which was kept as a backup for this purpose precisely. What is such a feature called?
Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?
Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?
Which layer of the Recovery Management Model would provide hassle-free recovery of systems in case of a disaster and would enable the control of data protection technologies such as replication and backup?
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?
Which of the following terms refers to a storage technology that is used to capture real-time data changes and facilitate data restore points and recovery?
When information confidentiality increases in PASIS architecture, what else also increases as a direct result?
Jack was setting up BCP training for those employees in the organization who did not have a large role to play in the execution of the BCP. This training consisted of the framework, processes, and strategies involved in the plan. What is this training known as?
Which of the following is a virtualization standard specified by the Distributed Management Task Force (DMTF)?
Which of the following terms refers to the training milestones that must be achieved in order to meet the BC training program’s aim?
Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?
Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:
a) Assess the potential impact of the threat on the organization
b) Estimate the probability of occurrence of each threat
c) Assess the internal and external resources available to mitigate the identified threats
d) List the threats that may occur
In which order should Jon implement these steps?
A few days after Fred launched his new website online, he discovers that the site is not accessible. Upon investigation, he learns that some of the hosting files on the server have been corrupted. Which of the following servers would Fred have to restore to get his site back up?
James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?
Amy was conducting a disaster recovery test at her clinic. In this test scenario, a real-life disaster was mimicked, and important aspects such as software, communication, procedures, and personnel were tested. Which test was Amy conducting?