CIS 359 Final Exam Set 1 NEW http://www.assignmentcloud.com/cis-359-stayer/cis-359-final-exam-set-1-new • Question 1____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest. • Question 2Contingency strategies for ____ should emphasize the need for absolutely reliable data backup and recovery procedures because they have less inherent redundancy than a distributed architecture. • Question 3 A ____ is a description of the disasters that may befall an organization, along with information on their probability of occurrence, a brief description of the organization's actions to prepare for that disaster, and the best case, worst case, and most likely case outcomes of the disaster. • Question 4The primary vehicle for articulating the purpose of a disaster recovery program is the ____. • Question 5The ____ assembles a disaster recovery team. • Question 6A ____ is a collection of nodes in which the segments are geographically dispersed and the physical link is often a data communications channel provided by a public carrier. • Question 7Deciding which technical contingency strategies are selected, developed, and implemented is most often based on the type of ____ being used. • Question 8____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up. • Question 9 A(n) ____ occurs when a situation results in service disruptions for weeks or months, requiring a government to declare a state of emergency. • Question 10The ____ team is responsible for providing the initial assessments of the extent of damage to equipment and systems on-site and/or for physically recovering the equipment to be transported to a location where the other teams can evaluate it. • Question 11During the ____ phase, the organization begins the recovery of the most time-critical business functions - those necessary to reestablish business operations and prevent further economic and image loss to the organization. • Question 12In the context of disaster notification, the ____ is a scripted description of the disaster and consists of just enough information so that each response knows what port of the DR plan to implement. • Question 13 The ____ team is responsible for working with the remainder of the organization to assist in the recovery of nontechnology functions. • Question 14The ____ involves providing copies of the DR plan to all teams and team members for review. • Question 15____ is the inclusion of action steps to minimize the damage associated with the disaster on the operations of the organization. • Question 16The ____ team is primarily responsible for data restoration and recovery. • Question 17In the ____ phase of the BC plan, the organization specifies what type of relocation services are desired and what type of data management strategies are deployed to support relocation. • Question 18The ____ is the amount of time that a business can tolerate losing capabilities until alternate capabilities are available. • Question 19The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored. • Question 20The plan maintenance schedule in a BC policy statement should address the ____ of reviews, along with who will be involved in each review. Save the publication to a stack Like to get better recommendations The publisher does not have the license to enable download This preview shows page 8 - 12 out of 14 pages.
This preview shows page 3 - 6 out of 11 pages.
Looking for Expert Opinion? Let us have a look at your work and suggest how to improve it! Get a Consultant
|