bcm chap 3 quiz reviewer

8

Click here to load reader

Upload: aavish-krishali

Post on 07-Feb-2016

2.610 views

Category:

Documents


123 download

DESCRIPTION

Buisness Continuity Management

TRANSCRIPT

Page 1: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 1/8

Quiz Submissions - Chapter 3 Reviewer

Aavish Krishali (username: aavish.krishali)

Attempt 1Written: Oct 1, 2014 4:58 PM - Oct 1, 2014 6:03 PM

Submission ViewReleased: Sep 6, 2013 4:13 PM

Chapter 3 BCM

Question 1 1 / 1 point

For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.

False

True

Question 2 1 / 1 point

Some data is required by law to be retained and stored for years.

True

False

Question 3 1 / 1 point

RAID is an acronym for Redundant Array of Incident-Recovery Drives.

False

True

Question 4 1 / 1 point

One real-time protection and data backup strategy is the use of mirroring.

True

False

Question 5 1 / 1 point

Database shadowing techniques are generally used in organizations that do not need immediate data recovery after anincident or disaster.

False

True

Question 6 1 / 1 point

____ are used for recovery from disasters that threaten on-site backups.

Data archives

Cloud storage sites

Data backups

Electronic vaulting sites

Page 2: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 2/8

Question 7 0 / 1 point

Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement andthe duration of storage.

replication

business resumption

incident response

retention

Question 8 1 / 1 point

A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for informationsystems that have ____ priority within an organization.

critical

high

moderate

low

Question 9 1 / 1 point

A(n) ____ is an extension of an organization’s intranet into cloud computing.

private cloud

community cloud

public cloud

application cloud

Question 10 1 / 1 point

An organization aggregates all local backups to a central repository and then backs up that repository to an onlinevendor, with a ____ backup strategy.

disk-to-disk-to-tape

differential

RAID

disk-to-disk-to-cloud

Question 11 1 / 1 point

A(n) ____ backup only archives the files that have been modified since the last backup.

daily

differential

incremental

copy

Question 12 1 / 1 point

____ uses a number of hard drives to store information across multiple drive units.

Legacy backup

Page 3: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 3/8

RAID

Continuous database protection

Virtualization

Question 13 1 / 1 point

RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in whichdata segments are written in turn to each disk drive in the array.

disk mirroring

disk striping

disk duplexing

disk coding

Question 14 1 / 1 point

Considered to be the traditional “lock and copy” approach to database backup, _____ require the database to beinaccessible while a backup is created to a local drive.

continuous database protections

online backup applications

legacy backup applications

RAID Level 1+0 applications

Question 15 1 / 1 point

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizationsthat lease ____ are in effect using a preconfigured set of applications on someone else’s systems, it is reasonable toask that the service agreement include contingencies for recovery.

servers

PaaS

IaaS

SaaS

Question 16 1 / 1 point

Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performingbackups of data.

robustness

accuracy

speed

cost-effectiveness

Question 17 1 / 1 point

A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols andcommunications methods to provide an online storage environment.

storage area network

network-attached storage

Page 4: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 4/8

remote journal

virtual machine monitor

Question 18 1 / 1 point

When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in oron a host platform.

virtual machine

host machine

hypervisor

VMware

Question 19 1 / 1 point

A ____ is a synonym for a virtualization application.

host platform

virtual machine

virtual hardware

hypervisor

Question 20 1 / 1 point

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at amoment’s notice.

mobile site

mirrored site

service bureau

hot site

Question 21 1 / 1 point

A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facilitysimultaneously.

time-share

service bureau

cold site

mobile site

Question 22 1 / 1 point

A ____ is an agency that provides physical facilities in the event of a disaster for a fee.

time-share

service bureau

cold site

mobile site

Page 5: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 5/8

Question 23 1 / 1 point

A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.

memorandum of understanding

mutual agreement

service agreement

time-share agreement

Question 24 1 / 1 point

A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.

statement of indemnification

intellectual property assurance

nondisclosure agreement

covenant not to compete

Question 25 1 / 1 point

A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.

statement of indemnification

intellectual property assurance

nondisclosure agreement

covenant not to compete

Question 26 1 / 1 point

A(n) ____ is an agreement in which the client agrees not to use the vendor’s services to compete directly with thevendor, and for the client not to use vendor information to gain a better deal with another vendor.

statement of indemnification

intellectual property assurance

nondisclosure agreement

covenant not to compete

Question 27 1 / 1 point

A(n) ____________________ backup is a backup of a set of specified files, regardless of whether they have beenmodified or otherwise flagged for backup.

Answer: copy

Question 28 1 / 1 point

RAID 5 drives can be ____________________, meaning they can be replaced without taking the entire system down.

Answer: hot swapped

Question 29 1 / 1 point

____________________ is the transfer of live transactions to an off-site facility.

Answer: Remote journaling

Question 30 0 / 1 point

Page 6: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 6/8

A(n) ____________________ is a duplicate facility that needs only the latest data backups and the personnel tofunction.

Answer: Hot site (/hot site/)

Question 31 0 / 1 point

If an organization needs to plan for resumption and cannot justify the expense of an exclusive-use strategy, it canchoose a shared-use option. A(n) ____________________ operates like an exclusive-use site but it is leased inconjunction with a business partner or sister organization.

Answer: time share (/time-share/)

Question 32 9 / 9 points

Match each item with a statement below.

__1__ Applications that are made available to users over the Internet

__9__ Bulk transfer of data in batches to an off-site facility

__2__ Development platforms that are made available to developers over theInternet

__3__ Implementation in which a service provider makes computing resourcesavailable over the Internet

__4__ Implementation in which several organizations share computing resources

__7__ Implementation of RAID Level 1

__8__ Allows you to reboot a system from a CD-ROM

__6__ A RAID implementation that protects against loss of data access due to asingle component’s failure

__5__ A RAID implementation that protects against data loss due to disk failure

1. Software as a Service(SaaS)

2. Platform as a Service(PaaS)

3. Public cloud

4. Community cloud

5. FRDS

6. FTDS

7. Disk mirroring

8. Bare metal recovery

9. Electronic vaulting

Question 33 0 / 1 point

List the five key protection and recovery mechanisms that facilitate the restoration of critical information and thecontinuation of business operations.

Delayed protection, real-time protection, server recovery, application recovery and site recovery.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 34 0 / 1 point

Briefly describe differential backup. What are some of the advantages and disadvantages of using differential backup?

A differential backup is the storage of all files that have changed or been added since the last full backup. Theadvantage is that it reduces the space requirement and time to the backup but the downside is that if an incidentoccurs multiple backups are needed to restored to restore a system.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 35 0 / 1 point

The market for consumer-grade tape backups has dwindled to a fraction of its former popularity in the last decade.What are the primary drawbacks of tape backup?Primary drawbacks of tape backup are the cost of specialized hardware to read tapes, cost involved in storing tapesand reliability to restore from the tape.

This question has not been graded.

Page 7: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 7/8

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 36 0 / 1 point

Even the best backups are inadequate unless they can be used to successfully restore systems to an operational state.What are some of the questions that must be answered by a backup and recovery plan?

Each backup and recovery setting should be provided with complete recovery plans, including testing and rehearsal.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 37 0 / 1 point

One strategy for implementing server recovery and redundancy through mirroring servers uses hot, warm, and coldservers. Explain how this strategy works.In this strategy, the online primary server is the hot server and it provides the services necessary to supportoperations. The warm server serves as an secondary server and services request from primary when it is down orbusy. The cold server is the administrator's test platform and should be identically configured to the hot and warmservers. This is used to test new patches and avoid hot server going down. Should the hot server go down, the warmserver takes over as hot server as the hot server is bought up.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 38 0 / 1 point

What is the difference between remote journaling and electronic vaulting?

E-vaulting is the transferring bulk of data in batches to an off-site facility whereas remote journaling transfers livetransactions to an off-site thereby recording all changes.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 39 0 / 1 point

Briefly explain how database shadowing works.Database shadowing, also known as data bank shadowing, is the storage of duplicate online transaction data, alongwith the duplication of database at the remote site to a redundant server.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 40 0 / 1 point

Database replication focuses on the backup of multiple copies of the database for recovery purposes. Briefly describethree types of database replication.The 3 types of db replication are :1. Snapshot replication: Copying data from one database to another2.Merger replication: Merging data from multiple databases into a separate database.3. Transaction replication: Using a master db for regular operations but periodically copying new and updated entriesto a backup db.

Page 8: BCM CHap 3 Quiz Reviewer

10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 8/8

Close

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 41 0 / 1 point

Using virtualization, an organization can take its existing hardware and deploy any other operating system and/orapplication. There are several different levels of virtualization. Describe one of these: application-level virtualization.

This method virtualizes the OS layer so as to look to the application as the the expected OS, answering all necessaryapplication programming interface(API) call made by the application. The application perceives that it is interactingwith the host OS and the resources managed by it. This method is used to run application intended to run on non-native OS.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Question 42 0 / 1 point

Explain how a mutual agreement would work as a shared-site resumption strategy.A mutual agreement is a contract between two organization for each other to assist the other in the event ofdisaster. This allow the organization to use the resources of the other without investing in hardware forincidence/disaster recovery. It allows for the organization to save a lot of resources for disaster recovery but islimited to the level of agreement and investment of resources from the other.

This question has not been graded.

The correct answer is not displayed for Long Answer type questions.

View Feedback

Attempt Score: 37 / 50 - 74

Overall Grade (highest attempt): 37 / 50 - 74