bcm chap 3 quiz reviewer
DESCRIPTION
Buisness Continuity ManagementTRANSCRIPT
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 1/8
Quiz Submissions - Chapter 3 Reviewer
Aavish Krishali (username: aavish.krishali)
Attempt 1Written: Oct 1, 2014 4:58 PM - Oct 1, 2014 6:03 PM
Submission ViewReleased: Sep 6, 2013 4:13 PM
Chapter 3 BCM
Question 1 1 / 1 point
For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.
False
True
Question 2 1 / 1 point
Some data is required by law to be retained and stored for years.
True
False
Question 3 1 / 1 point
RAID is an acronym for Redundant Array of Incident-Recovery Drives.
False
True
Question 4 1 / 1 point
One real-time protection and data backup strategy is the use of mirroring.
True
False
Question 5 1 / 1 point
Database shadowing techniques are generally used in organizations that do not need immediate data recovery after anincident or disaster.
False
True
Question 6 1 / 1 point
____ are used for recovery from disasters that threaten on-site backups.
Data archives
Cloud storage sites
Data backups
Electronic vaulting sites
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 2/8
Question 7 0 / 1 point
Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement andthe duration of storage.
replication
business resumption
incident response
retention
Question 8 1 / 1 point
A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for informationsystems that have ____ priority within an organization.
critical
high
moderate
low
Question 9 1 / 1 point
A(n) ____ is an extension of an organization’s intranet into cloud computing.
private cloud
community cloud
public cloud
application cloud
Question 10 1 / 1 point
An organization aggregates all local backups to a central repository and then backs up that repository to an onlinevendor, with a ____ backup strategy.
disk-to-disk-to-tape
differential
RAID
disk-to-disk-to-cloud
Question 11 1 / 1 point
A(n) ____ backup only archives the files that have been modified since the last backup.
daily
differential
incremental
copy
Question 12 1 / 1 point
____ uses a number of hard drives to store information across multiple drive units.
Legacy backup
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 3/8
RAID
Continuous database protection
Virtualization
Question 13 1 / 1 point
RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in whichdata segments are written in turn to each disk drive in the array.
disk mirroring
disk striping
disk duplexing
disk coding
Question 14 1 / 1 point
Considered to be the traditional “lock and copy” approach to database backup, _____ require the database to beinaccessible while a backup is created to a local drive.
continuous database protections
online backup applications
legacy backup applications
RAID Level 1+0 applications
Question 15 1 / 1 point
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizationsthat lease ____ are in effect using a preconfigured set of applications on someone else’s systems, it is reasonable toask that the service agreement include contingencies for recovery.
servers
PaaS
IaaS
SaaS
Question 16 1 / 1 point
Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performingbackups of data.
robustness
accuracy
speed
cost-effectiveness
Question 17 1 / 1 point
A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols andcommunications methods to provide an online storage environment.
storage area network
network-attached storage
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 4/8
remote journal
virtual machine monitor
Question 18 1 / 1 point
When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in oron a host platform.
virtual machine
host machine
hypervisor
VMware
Question 19 1 / 1 point
A ____ is a synonym for a virtualization application.
host platform
virtual machine
virtual hardware
hypervisor
Question 20 1 / 1 point
A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at amoment’s notice.
mobile site
mirrored site
service bureau
hot site
Question 21 1 / 1 point
A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facilitysimultaneously.
time-share
service bureau
cold site
mobile site
Question 22 1 / 1 point
A ____ is an agency that provides physical facilities in the event of a disaster for a fee.
time-share
service bureau
cold site
mobile site
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 5/8
Question 23 1 / 1 point
A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.
memorandum of understanding
mutual agreement
service agreement
time-share agreement
Question 24 1 / 1 point
A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 25 1 / 1 point
A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 26 1 / 1 point
A(n) ____ is an agreement in which the client agrees not to use the vendor’s services to compete directly with thevendor, and for the client not to use vendor information to gain a better deal with another vendor.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 27 1 / 1 point
A(n) ____________________ backup is a backup of a set of specified files, regardless of whether they have beenmodified or otherwise flagged for backup.
Answer: copy
Question 28 1 / 1 point
RAID 5 drives can be ____________________, meaning they can be replaced without taking the entire system down.
Answer: hot swapped
Question 29 1 / 1 point
____________________ is the transfer of live transactions to an off-site facility.
Answer: Remote journaling
Question 30 0 / 1 point
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 6/8
A(n) ____________________ is a duplicate facility that needs only the latest data backups and the personnel tofunction.
Answer: Hot site (/hot site/)
Question 31 0 / 1 point
If an organization needs to plan for resumption and cannot justify the expense of an exclusive-use strategy, it canchoose a shared-use option. A(n) ____________________ operates like an exclusive-use site but it is leased inconjunction with a business partner or sister organization.
Answer: time share (/time-share/)
Question 32 9 / 9 points
Match each item with a statement below.
__1__ Applications that are made available to users over the Internet
__9__ Bulk transfer of data in batches to an off-site facility
__2__ Development platforms that are made available to developers over theInternet
__3__ Implementation in which a service provider makes computing resourcesavailable over the Internet
__4__ Implementation in which several organizations share computing resources
__7__ Implementation of RAID Level 1
__8__ Allows you to reboot a system from a CD-ROM
__6__ A RAID implementation that protects against loss of data access due to asingle component’s failure
__5__ A RAID implementation that protects against data loss due to disk failure
1. Software as a Service(SaaS)
2. Platform as a Service(PaaS)
3. Public cloud
4. Community cloud
5. FRDS
6. FTDS
7. Disk mirroring
8. Bare metal recovery
9. Electronic vaulting
Question 33 0 / 1 point
List the five key protection and recovery mechanisms that facilitate the restoration of critical information and thecontinuation of business operations.
Delayed protection, real-time protection, server recovery, application recovery and site recovery.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 34 0 / 1 point
Briefly describe differential backup. What are some of the advantages and disadvantages of using differential backup?
A differential backup is the storage of all files that have changed or been added since the last full backup. Theadvantage is that it reduces the space requirement and time to the backup but the downside is that if an incidentoccurs multiple backups are needed to restored to restore a system.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 35 0 / 1 point
The market for consumer-grade tape backups has dwindled to a fraction of its former popularity in the last decade.What are the primary drawbacks of tape backup?Primary drawbacks of tape backup are the cost of specialized hardware to read tapes, cost involved in storing tapesand reliability to restore from the tape.
This question has not been graded.
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 7/8
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 36 0 / 1 point
Even the best backups are inadequate unless they can be used to successfully restore systems to an operational state.What are some of the questions that must be answered by a backup and recovery plan?
Each backup and recovery setting should be provided with complete recovery plans, including testing and rehearsal.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 37 0 / 1 point
One strategy for implementing server recovery and redundancy through mirroring servers uses hot, warm, and coldservers. Explain how this strategy works.In this strategy, the online primary server is the hot server and it provides the services necessary to supportoperations. The warm server serves as an secondary server and services request from primary when it is down orbusy. The cold server is the administrator's test platform and should be identically configured to the hot and warmservers. This is used to test new patches and avoid hot server going down. Should the hot server go down, the warmserver takes over as hot server as the hot server is bought up.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 38 0 / 1 point
What is the difference between remote journaling and electronic vaulting?
E-vaulting is the transferring bulk of data in batches to an off-site facility whereas remote journaling transfers livetransactions to an off-site thereby recording all changes.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 39 0 / 1 point
Briefly explain how database shadowing works.Database shadowing, also known as data bank shadowing, is the storage of duplicate online transaction data, alongwith the duplication of database at the remote site to a redundant server.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 40 0 / 1 point
Database replication focuses on the backup of multiple copies of the database for recovery purposes. Briefly describethree types of database replication.The 3 types of db replication are :1. Snapshot replication: Copying data from one database to another2.Merger replication: Merging data from multiple databases into a separate database.3. Transaction replication: Using a master db for regular operations but periodically copying new and updated entriesto a backup db.
10/1/2014 Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0 8/8
Close
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 41 0 / 1 point
Using virtualization, an organization can take its existing hardware and deploy any other operating system and/orapplication. There are several different levels of virtualization. Describe one of these: application-level virtualization.
This method virtualizes the OS layer so as to look to the application as the the expected OS, answering all necessaryapplication programming interface(API) call made by the application. The application perceives that it is interactingwith the host OS and the resources managed by it. This method is used to run application intended to run on non-native OS.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 42 0 / 1 point
Explain how a mutual agreement would work as a shared-site resumption strategy.A mutual agreement is a contract between two organization for each other to assist the other in the event ofdisaster. This allow the organization to use the resources of the other without investing in hardware forincidence/disaster recovery. It allows for the organization to save a lot of resources for disaster recovery but islimited to the level of agreement and investment of resources from the other.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Attempt Score: 37 / 50 - 74
Overall Grade (highest attempt): 37 / 50 - 74