CASP lesson 3 Flashcards

1
Q

BCDR

A

Business Continuity and Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is essential for the ongoing upkeep of BCDR plans?

A

Senior leadership participation and oversight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An information-system focused plan and identifies the following required steps for
effective continuity planning

A

The National Institute of Standards and Technology (NIST) Special Publication (SP)
800-34 Rev-1 “Contingency Planning Guide for Federal Information Systems”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The National Institute of Standards and Technology (NIST) Special Publication (SP)
800-34 Rev-1 “Contingency Planning Guide for Federal Information Systems” steps for effective continuity planning; i.e, Business Continuity Planning (BCP)

A
  1. Develop the continuity planning policy statement.
  2. Conduct the business impact analysis.
  3. Identify preventive measures.
  4. Create contingency strategies.
  5. Develop an information system contingency plan.
  6. Ensure plan testing, training, and exercises.
  7. Ensure plan maintenance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are focused on the immediate needs of a disaster, when things are their most frantic and pressing, and is focused on the
tasks required to bring critical systems back online.

A

Disaster Recovery Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________________have a broad scope and cover the range of activities
from the development of a business continuity policy through the creation of the
response plans, evaluation activities, and plan maintenance.

A

Busines continuity plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The collaborative effort to identify those
systems and software that perform essential functions, meaning the organization
cannot run without them.

A

Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the collaborative effort to identify those
systems and software that perform essential functions, meaning the organization
cannot run without them?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first step in the development of the BIA

A

to identify the information systems
and the various elements that are part of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Goal of BIA

A

To assess importance of various elements nd their impact so
that recovery efforts can be prioritized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Measuring Recovery Effectiveness

A

It is not enough to simply bring systems online; how quickly and in what state need
to be defined as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Recovery Point Objective (RPO)

A

The recovery point objective defines the amount of data that can be lost without
irreparable harm to the operation of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Recovery Time Objective (RTO)

A

This metric defines the maximum amount of time that performing a recovery can
take. It defines the amount of system downtime the organization can withstand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Recovery Point and Recovery Time Objectives

A

It is possible to meet the recovery point objective, by successfully bringing systems back
online within the defined timespan, but fail the recovery time objective by recovering
those systems from backups that do not contain data within the recovery point objective.
For example, employees could successfully access the restored system but identify that
too much data is missing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Recovery Service Level

A

It is important to consider that only portions of a complete system may be critical,
and this should be reflected in the recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain Privacy Impact Assessment

A

A privacy impact assessment is conducted by an organization in order for it
to determine where privacy data is stored and how that privacy data moves
throughout an information system.

17
Q

NIST defines this as “An analysis of an information system’s
requirements, functions, and interdependencies used to characterize
system contingency requirements and priorities in the event of a
significant disruption.”

A

Business Impact Analysis (BIA)

18
Q

Which type of assessment seeks to identify specific types of sensitive
data so that its use and handling can be properly disclosed?

A

Privacy Impact Assessment

19
Q

Cold Site

A

one that requires the least amount of maintenance.

20
Q

warm site

A

site includes a datacenter
that is typically scaled-down from the primary site to include the capacity and
throughput needed to run critical systems and software. In addition, systems are
pre-configured and mostly ready to operate when needed although a measured
amount of re-configuration and preparation is needed in order for them to be
ready to operate in place of the primary site. expensive to operate
and complicated to maintain but the benefits are realized upon activation which can
take hours to perhaps a few days to accomplish.

21
Q

Hot Site

A

site is one that can
be activated and used within minutes. To be able to implement a DR site that can
operate in this way takes very specialized knowledge, sophisticated automation
capabilities, and platforms that are specifically designed to operate in this manner,
which is not common.

22
Q

Mobile site

A

site can be described as a data center in a box, albeit a large box!

23
Q

Mobile site

A

site can be described as a data center in a box, albeit a large box!

24
Q

Leveraging Cloud for DR Capacity

A

the capability to run a legacy on-premise solution in
the cloud is still feasible. To this end, many organizations make the decision to use
public cloud services as a DR site and this approach is often referred to as DR as a
service, or DRaaS. The cloud service is configured in much the same way as a warm
site, with systems pre-configured and/or data replicated to the cloud platform
in near real-time. If a disaster were to occur, the organization’s services would be activated on the cloud platform for the duration necessary until they can be
transitioned back to the primary site.

25
Q

Understanding Incident Response Roles standard

A

The National Institute of Standards and Technology (NIST)
Special Publication (SP) 800-61 “Computer Security Incident Handling Guide”

26
Q

The ________________________ not only documents the outputs of
the test or incident, but also includes recommendations based on the outputs
and findings.

A

After Action Report

27
Q

NIST standard for AAR

A

NIST SP 800-84 “Guide to Test, Training, and Exercise Programs for IT Plans and
Capabilities”

28
Q

First step in BIA?

A

As with critical security controls, the first step in the development of the BIA is to identify the information systems and the various elements that are part of it.

29
Q

The Sarbanes-Oxley (SOX) Act regarding fraudulent accounting

A

one example of standards and regulations with descriptions of Business Continuity and Disaster Recovery (BCDR) capabilities.

30
Q

typically “umbrella” contracts that establish an agreement between two entities to conduct business during a defined term.

A

Master Service Agreements (MSAs)

31
Q

In a ________________, the organization isolates the DR site from the primary site, activating it as though the company is using the DR site. This is the best option to minimize impact.

A

parallel test

32
Q

Standard that includes an after-action report template that helps with documentation and findings.

A

NIST SP 800-84, the “Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities

33
Q

Standard that outlines necessary controls for audits of information systems used for certification.

A

NIST 800-53, “Security and Privacy Controls for Information Systems,”

34
Q

Standard that identifies the groups that are necessary when responding to an incident.

A

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-61, “Computer Security Incident Handling Guide,”

35
Q

Standard that addresses addresses IT security techniques, including the introduction and general model and the functional and assurance components that define various operations.

A

The ISO standard 15408

36
Q

A framework created and maintained by Information Systems Audit and Control Association (ISACA). This frames IT risk from a business leadership viewpoint.

A

The Control Objectives for Information and Related Technologies (COBIT)

37
Q

Many organizations make the decision to use public cloud services as a Disaster Recovery (DR) site, and this approach is often referred to as _____________, or ___________.

A

DR as a Service, or DRaaS.