Chapter 13 Flashcards
The process of identifying exposure to threats, creating preventive and recovery procedures, and then
testing them to determine if they are sufficient, is known as:
Business continuity planning and testing
When a company needs to identify mission-critical business functions and quantify the impact a loss
of such functions may have on the organization in terms of it’s operational and financial position, what
should be performed?
Business impact analysis (BIA)
What type of plans include procedures to address redundancy and fault tolerance as well as data
backups?
Disaster recovery
Which term below describes a component or entity in a system which, if it no longer functions, will
disable an entire system?
single point of failure
A service contract between a vendor and a client that specifies what services will be provided, the
responsibilities of each party, and any guarantees of service, is known as:
service level agreement
Select below the type of cluster that is used to provide high-availability applications that require a high
level of read and write actions, such as databases, messaging systems, and file and print services:
asymmetric server
In what type of server cluster can services fail over from downed servers to functional servers?
symmetric server
How can an administrator keep devices powered when power is interrupted?
uninterruptible system supply
A location that has all the equipment installed but does not have active Internet or telecommunications
facilities, and does not have current backups of data, is an example of a:
Warm Site
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
Faraday cage
Using technology to search for computer evidence of a crime in order to retrieve information, even if
it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:
Computer forensics
According to the Federal Bureau of Investigation (FBI), what percentage of crime committed today
leaves behind digital evidence that can be retrieved via computer forensics?
85
What kind of data can be lost when a computer is turned off?
Volatile
A snapshot of the current state of a computer that contains all current settings and data is known as
what option below:
system image
What is the name for an image that consists of an evidence-grade backup because its accuracy meets
evidence standards?
mirror image
What term is used to describe a documentation of control over evidence, which is used to ensure that
no unauthorized person was given the opportunity to corrupt the evidence?
chain of custody
Multiple sectors on a disk, when combined, are referred to as a:
Cluster
The remaining cluster space of a partially filled sector is padded with contents from RAM. What is
the name for this type of scenario?
RAM slack
What kind of slack is created from information stored on a hard drive, which can contain remnants of
previously deleted files or data?
Drive file slack
What RAID type below utilizes parity data across all drives instead of using a separate drive to hold
parity error checking information?
RAID 5