quiz

QUESTION 1

The disaster recovery and business continuity plans will need to be activated simultaneously to address large-scale distributed denial-of-service attacks. True
False

0.05 points   
QUESTION 2

A(n) __________________________ approach is a physical host resource that is divided between the host and virtual machines and enables the virtual machines to act as an independent system.a.Hardware-level virtualizationb.Virtual cloud-level virtualizationc.Application-level virtualizationd.Operating system-level virtualization

0.05 points   
QUESTION 3

Short of physical actions, a(n) __________________ is an effective training approach that mimics full performance components that are expected to be executed.

0.05 points   
QUESTION 4

Hot, warm, and cold sites are time-share options that are leased in conjunction with other business partners and allows an organization to establish disaster recovery and incident response options at a reduced cost. True
False

0.05 points   
QUESTION 5

A(n) ___________________ process involves using the master database to continue normal operations while also periodically copying new or updated data entries into a backup source.a.Transferal replicationb.Transaction replicationc.Snapshot replicationd.Merger replication

0.05 points   
QUESTION 6

A(n) _______________________________ protects data against access loss caused by cache, device change, power supply, and other controller module failures.a.failure resistant disk systemsb.disaster tolerant disk systemsc.failure tolerant disk systemsd.disaster resistant disk systems

0.05 points   
QUESTION 7

A(n) _____________________ comprises of two or more independent zones that safeguards against loss or multiple disk failure.a.disaster resistant disk systemsb.failure resistant disk systemsc.failure tolerant disk systemsd.disaster tolerant disk systems

0.05 points   
QUESTION 8

A(n) _____________________ technology was designed to replace operating systems and its services in the event they fail.

0.05 points   
QUESTION 9

A(n) ___________________________ necessitates less time and space because this approach archives all modified files since the system’s last backup.a.differential backupb.copy backupc.daily backupd.incremental backup

0.05 points   
QUESTION 10

A(n) _________________________ process involves copying data from one source to another.a.Snapshot replicationb.Merger replicationc.Transaction replicationd.Transferal replication

0.05 points   
QUESTION 11

An organization’s business resumption plan identifies, describes, and lists all resources that are needed to restore normal operation at its primary location. True
False

0.05 points   
QUESTION 12

A(n) ______________________ process involves margining data from multiple databases into a streamlined or segmented source.a.Transferal replicationb.Merger replicationc.Transaction replicationd.Snapshot replication

0.05 points   
QUESTION 13

A(n) _______________________ are a training approach that is used by the CSIRT team on the IR plan as it allows information security staff to use realistic networks and information systems to simulate attacks.

0.05 points   
QUESTION 14

RAID Level 5+1 stripes data across multiple drives and necessitates a dedicated parity drive that enables its replacement without taking the system completely down. True
False

0.05 points   
QUESTION 15

A(n) _______________________ approach enhances compatibility and portability of computing resources by acknowledging API calls initiated by the software.a.Hardware-level virtualizationb.Virtual cloud-level virtualizationc.Application-level virtualizationd.Operating system-level virtualization

0.05 points   
QUESTION 16

A(n) ____________________  is hosted by a third party and enables multiple organizations with a common interests to share its computer and application resources.

0.05 points   
QUESTION 17

Mirrored sites are a desirable hot site option because it contains identical resources used at the primary site, as data transfers are either live or periodically backed up.  True
False

0.05 points   
QUESTION 18

A(n) ___________________________ testings approach enables CSIRT members to follow all written processes within the incident response plan such as taking a system down, performing data restoration from backups, and conducting notifications.

0.05 points   
QUESTION 19

A(n) __________________ stores files that either were added or modified since the systems last full backup.a.copy backupb.daily backupc.differential backupd.incremental backup

0.05 points   
QUESTION 20

Forensic analysis is a systematic process to examine information assets for historical evidentiary material that can provide insight into how an incident transpired. True
False

0.05 points   
QUESTION 21

A(n) ________________________ is a replaceable monitoring unit and failure indicator that protects against data loss and system failures.a.disaster resistant disk systemsb.disaster tolerant disk systemsc.failure resistant disk systemsd.failure tolerant disk systems

0.05 points   
QUESTION 22

Preventative measures that are executed by the incident response team to manage risks associated with specific attacks are evaluated during the a(n) __________________ planning process.

0.05 points   
QUESTION 23

A(n) ______________________ processes are strategies that focus on backing up multiple copies of a database for system recovery purposes.

0.05 points   
QUESTION 24

A(n) __________________ outline expectations and capabilities that must be acquired for the organization’s alternative site.

0.05 points   
QUESTION 25

Operating systems initiates a process that creates a recording for the behavior of an object once the journaling function is enabling for the object; these recorded entries are then stored in the IDPS. True
False

0.05 points   
QUESTION 26

Incident response processes contain and resolve events in accordance with the incident response plan, as its overall operations are inclusive of preparation, detection, analysis, containment, eradication, and post-incident activities. True
False

0.05 points   
QUESTION 27

A(n) ______________________ approach enables CSIRT members to perform its expected and required tasks by completing those outlined duties without interrupting core business operations.

0.05 points   
QUESTION 28

A(n) _________________________ approach enhances utilization controls because it extends multiple OS virtual sessions which permits an application to operate independently of one another.a.Operating system-level virtualizationb.Virtual cloud-level virtualizationc.Application-level virtualizationd.Hardware-level virtualization

0.05 points   
QUESTION 29

A(n) ________________________ are incident response procedures that exclude efforts that are taken to preate actions because they are not considered a part of the required preventative controls.

0.05 points   
QUESTION 30

A(n) ____________________ replicates specific file subsets regardless if the files were identified or modified.a.daily backupb.differential backupc.incremental backupd.copy backup

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?