The ____ assembles a disaster recovery team.

CIS 359 Final Exam Set 1 NEW

http://www.assignmentcloud.com/cis-359-stayer/cis-359-final-exam-set-1-new

• Question 1____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest. • Question 2Contingency strategies for ____ should emphasize the need for absolutely reliable data backup and recovery procedures because they have less inherent redundancy than a distributed architecture. • Question 3 A ____ is a description of the disasters that may befall an organization, along with information on their probability of occurrence, a brief description of the organization's actions to prepare for that disaster, and the best case, worst case, and most likely case outcomes of the disaster. • Question 4The primary vehicle for articulating the purpose of a disaster recovery program is the ____. • Question 5The ____ assembles a disaster recovery team. • Question 6A ____ is a collection of nodes in which the segments are geographically dispersed and the physical link is often a data communications channel provided by a public carrier. • Question 7Deciding which technical contingency strategies are selected, developed, and implemented is most often based on the type of ____ being used. • Question 8____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up. • Question 9 A(n) ____ occurs when a situation results in service disruptions for weeks or months, requiring a government to declare a state of emergency. • Question 10The ____ team is responsible for providing the initial assessments of the extent of damage to equipment and systems on-site and/or for physically recovering the equipment to be transported to a location where the other teams can evaluate it. • Question 11During the ____ phase, the organization begins the recovery of the most time-critical business functions - those necessary to reestablish business operations and prevent further economic and image loss to the organization. • Question 12In the context of disaster notification, the ____ is a scripted description of the disaster and consists of just enough information so that each response knows what port of the DR plan to implement. • Question 13 The ____ team is responsible for working with the remainder of the organization to assist in the recovery of nontechnology functions. • Question 14The ____ involves providing copies of the DR plan to all teams and team members for review. • Question 15____ is the inclusion of action steps to minimize the damage associated with the disaster on the operations of the organization. • Question 16The ____ team is primarily responsible for data restoration and recovery. • Question 17In the ____ phase of the BC plan, the organization specifies what type of relocation services are desired and what type of data management strategies are deployed to support relocation. • Question 18The ____ is the amount of time that a business can tolerate losing capabilities until alternate capabilities are available. • Question 19The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored. • Question 20The plan maintenance schedule in a BC policy statement should address the ____ of reviews, along with who will be involved in each review. 

Share the publication

Save the publication to a stack

Like to get better recommendations

The publisher does not have the license to enable download

This preview shows page 8 - 12 out of 14 pages.

Question 5 The assembles a disaster recovery team Question 6 A is a collection

This preview shows page 3 - 6 out of 11 pages.

Looking for Expert Opinion?

Let us have a look at your work and suggest how to improve it!

Get a Consultant

____ disasters include acts of terrorism and acts of war.

man-made

Which of the following is not usually an insurable loss?

Electrostatic discharge

An ____ may escalate into a disaster when it grows in scope and intensity.

incident

In disaster recovery, the ____ is the point at which a management decision to react is made in reaction to a notice or other datum such as a weather report or an activity report from IT indicating the escalation of an incident.

trigger

A ____ is a description of the disasters that may befall an organization, along with information on their probability of occurrence, a brief description of the organization’s actions to prepare for that disaster, and the best case, worst case, and most likely case outcomes of the disaster.

disaster scenario

Useful resources in the DR planning process are the ____ provided by the Federal Agency Security Practices (FASP) section of NIST’s Computer Security Resource Center (CSRC).

contingency plan templates

____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.

Follow-on incidents

A ____ is used for an office or small campus, with segment distances measured in tens of meters. It may have only a few hosts, or it may have hundreds of clients with multiple servers.

LAN

____ may be caused by earthquakes, floods, storm winds, tornadoes, or mud flows.

Rapid onset disasters

____ are those that occur suddenly, with little warning, taking the lives of people and destroying the means of production.

Rapid onset disasters

A DR plan addendum should include the trigger, the ____ method, and the response time associated with each disaster situation.

notification

The part of a disaster recovery policy that identifies the organizational units and groups of employees to which the policy applies is called the ____ section.

scope

____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest.

Follow-on incidents

A ____ is a collection of nodes in which the segments are geographically dispersed and the physical link is often a data communications channel provided by a public carrier.

WAN

The ____ assembles a disaster recovery team.

CPMT

According to NIST, the first item of business for a disaster recovery team is to develop the ____.

disaster recovery policy

The primary vehicle for articulating the purpose of a disaster recovery program is the ____.

disaster recovery policy

____ occur over time and slowly deteriorate the organization’s capacity to withstand their effects.

Slow onset disasters

Once the incident has been contained, and all signs of the incident removed, the ____ phase begins.

actions after

Deciding which technical contingency strategies are selected, developed, and implemented is most often based on the type of ____ being used.

information system

Contingency strategies for ____ should emphasize the need for absolutely reliable data backup and recovery procedures because they have less inherent redundancy than a distributed architecture.

mainframes