disaster recovery plan Flashcards

(20 cards)

1
Q

What is a Disaster Recovery Plan (DRP)?

A

A documented process to recover IT systems and data after a disaster or major disruption.

Key components include risk assessment, recovery objectives, backup sites, and testing and drills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key components of a Disaster Recovery Plan?

A
  • Risk Assessment
  • Recovery Objectives
  • Backup Sites
  • Testing and Drills

These components help ensure business continuity and minimize downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does RTO stand for in the context of disaster recovery?

A

Recovery Time Objective

RTO defines the maximum acceptable amount of time to restore systems after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does RPO stand for in disaster recovery?

A

Recovery Point Objective

RPO defines the maximum acceptable amount of data loss measured in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Backup?

A

The process of creating copies of data to restore it in case of loss or corruption.

Best practices include regular backups, offsite storage, incremental and full backups, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the best practices for data backup?

A
  • Regular Backups
  • Offsite Storage
  • Incremental and Full Backups
  • Encryption

These practices help protect against data loss and facilitate quick restoration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Uninterruptible Power Supply (UPS)?

A

A device that provides temporary power during outages or voltage fluctuations.

Key features include battery backup and surge protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key features of a UPS?

A
  • Battery backup
  • Surge protection

These features prevent data loss and hardware damage during power interruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Surge Protectors?

A

Devices that protect electrical equipment from voltage spikes.

They absorb excess voltage to prevent damage to connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Firewall?

A

A security system that monitors and controls incoming and outgoing network traffic based on predefined rules.

Types include hardware firewalls and software firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of Firewalls?

A
  • Hardware Firewalls
  • Software Firewalls

Hardware firewalls protect entire networks, while software firewalls provide control on individual devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Authentication?

A

Verifying the identity of users or devices before granting access to systems or data.

Methods include usernames and passwords, key cards, and biometric devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some methods of Authentication?

A
  • Usernames and Passwords
  • Key Cards
  • Biometric Devices

Multi-factor authentication enhances security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Encryption?

A

The process of converting data into a coded format to prevent unauthorized access.

Use cases include encrypting data at rest and in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Intrusion Detection Software (IDS)?

A

Tools that monitor network or system activities for suspicious behavior or policy violations.

Types include Network-Based IDS (NIDS) and Host-Based IDS (HIDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of Intrusion Detection Software?

A
  • Network-Based IDS (NIDS)
  • Host-Based IDS (HIDS)

NIDS monitors network traffic, while HIDS monitors individual devices.

17
Q

What is Antivirus Software?

A

Programs designed to detect, prevent, and remove malware (e.g., viruses, worms, ransomware).

Features include real-time scanning and regular updates.

18
Q

What are Audit Trails?

A

Records of system activities that provide a chronological log of events.

Use cases include tracking user actions and supporting forensic investigations.

19
Q

What are Transaction Logs?

A

Records of all transactions performed within a system or database.

They ensure data integrity and facilitate troubleshooting.

20
Q

What is a key strategy for maximizing risk mitigation?

A

Adopt a layered approach by combining multiple strategies.

Examples include using firewalls with IDS and implementing encryption and authentication.