CISSP ch 18 Flashcards

(47 cards)

1
Q

DRP

A

Disaster recovery plan

disaster recovery planning picks up where business continuity planning leaves off

goal of DRP is to restore regular business activity as quickly as possible

preventing business interruption is the goal of business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

100-year floodplain

A

chance of flooding in that area are 1 in 100, or 1.0 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UPS

A

uninterruptible power supply = provides battery-supplied power for a short period of time, between 5 and 30 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Generator

A

provides long-term power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SPOF

A

single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAID-0

A

striping

uses two or more disks and improves the disk subsystem performance, but does not provide fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID-1

A

mirroring

uses two disks, which both hold the same data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAID-5

A

= striping with parity

uses three or more disks with the equivalent of one disk holding parity information

parity information allows the reconstruction of data through mathematical calculations if a single disk is lost

if any single disk fails, the RAID array will continue to operate, but will be slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAID-6

A

functions in the same manner as RAID-5 but stores parity information on two disks, protecting against the failure of two separate disks but requiring a minimum of four disks to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID-10

A

RAID 1 + 0 = stripe of mirrors

configured as two or more mirrors (RAID-1) with each mirror configured in a striped configuration (RAID-0)

uses at least four disks but can support more as long as an even number of disks are added

will continue to operate even if multiple disks fail, as long as at least one drive in each mirror continues to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

software-based RAID solutions/systems

A

require the operating system to manage the disks in the array and can reduce overall system performance

relatively inexpensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hardware-based RAID solutions/systems

A

generally more efficient and reliable

more expensive

typically include spare drives that can be logically added to the array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hot swapping

A

replacing failed disks without powering down the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cold swapping

A

requires the system to be powered down to replace a faulty drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

failover

A

when another server in a cluster takes of the load of a failed server in an automatic process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

trusted recovery

A

provides assurances that after a failure or crash, the system is just as secure as it was before the failure or crash occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Manual recovery (trusted recovery)

A

if a system fails, it does not fail in a secure state; instead, an administrator is required to manually perform the actions necessary to implement a secured or trusted recovery after a failure or system crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

automated recovery (trusted recovery)

A

system is able to perform trusted recovery activities to restore itself against at least one type of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

automated recovery without undue loss (trusted recovery)

A

similar to automated recovery, but included mechanisms to ensure that specific objects are protected to prevent their loss

e.g., steps to restore data or other objects, restore corrupted files, rebuild data from transaction logs and verify the integrity of key system and security components

20
Q

function recovery (trusted recovery)

A

automatically recover specific functions

ensures that the system is able to successfully complete the recovery for the functions, or that the system will be able to roll back the changes to return to a secure state

21
Q

QoS

A

Quality of service controls = protect the availability of data networks under load

22
Q

bandwidth

A

the network capacity available to carry communications

23
Q

latency

A

the time it takes a packet to travel from source to destination

24
Q

jitter

A

the variation in latency between different packets

25
packet loss
some packets may be lost between source and destination, requiring retransmission
26
interference
electrical noise, faulty equipment and other factors may corrupt the contents of packets
27
ACV clause
actual cash value clause in insurance contracts = when damaged property is compensated based on the fair market value of the items on the date of loss, less all accumulated depreciation since the time of their purchase
28
BIA
business impact analysis
29
MTTR
mean time to repair
30
MTD
maximum tolerable downtime
31
RTO
recovery time objective
32
RPO
recovery point objective specifies the maximum amount of data that may be lost during a disaster and should be used to guide backup strategies
33
fail-secure system
will default to a secure state in the event of a failure, blocking all access
34
fail-open system
will fail in an open state, granting all access
35
MAAs
mutual assistance agreements = reciprocal agreements rare in real-world practice but popular in literature two organizations pledge to assist each other in the event of a disaster by sharing computing facilities or other technological resources
36
Electronic vaulting
database backups are moved to a remote site using bulk transfers remote location may be a dedicated alternative recovery site or simply an offsite location managed within the company or by a contractor for the purpose of maintaining backup data potential for data loss - you will only be able to recover information as of the time of the last vaulting operation
37
remote journaling
data transfers are performed in a more expeditious manner; data transfers still occur in a bulk transfer mode, but on a more frequent basis, usually once every hour and sometimes more frequently instead of entire database backup, only database transaction logs are transferred, containing transactions that occurred since the previous bulk transfer not applied to a live database, maintained in a backup device when disaster is declared, technicians retrieve the appropriate transaction logs and apply them to the production database
38
remote mirroring
Most advanced database backup solution and the most expensive live database server is maintained at the backup site ready to take over an operational role at a moment’s notice popular strategy when implementing a hot site
39
full backup
1 backup to load once a full backup is complete, the archive bit on every file is reset, turned off or set to 0
40
differential backups
1 full back up + 1 differential backup to load store all files that have been modified since the time of the most recent full backup the differential backup does not change the archive bit when restoring, just need last full backup and most recent differential backup don’t take as long to restore, but take longer to create than incremental backups
41
incremental backups
1 full backup + n incremental backups to load store only those files that have been modified since the time of the most recent full or incremental backup only files that have the archive bit turned on, enabled or set to 1 are duplicated once an incremental backup is complete, the archive bit on all duplicated files is reset, turned off or set to 0 when restoring, need last full backup and all incremental backups
42
D2D
Disk-to-disk backup solutions
43
VTL
virtual tape libraries = support the use of disks with the tape paradigm by using software to make disk storage appear as tapes to backup software
44
Tape rotation strategies
Grandfather-Father-Son (GFS) Tower of Hanoi Six Cartridge Weekly Backup
45
HSM
hierarchical storage management system = an automated robotic backup jukebox consisting of 32 or 64 optical or tape backup devices; all the drive elements with an HSM system are configured as a single drive array (a bit like a RAID)
46
recovery vs restoration
Recovery = bringing business operations and processes back to a working state Restoration = bringing a business facility and environment back to a workable state
47
Test types
read-through test / checklist tests structured walk-through / tabletop exercise simulation tests similar to structure walk-through, but business can actually be interrupted and tested parallel tests full-interruption tests