SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Business Continuity And Disaster Recovery
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How should a team break down recovery strategies?
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
An estimate of how long it will take to fix a piece of equipment and get it back into production
Responsible for getting the alternate site into a working and functioning environment. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and ins
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
2. What are some of the characteristics you should look at when creating a BIA?
Reduce the risk of financial loss by improving the company's ability to recover and restore operations
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
The outage time that can be endured by a company
Makes copies of files as they are modified and periodically transmits them to an offsite backup site. The transmission doesn't happen in real time but is carried out in batches
3. Cyber Incident Response Plan
1. Develop the continuity planning policy statement 2. Conduct the business impact analysis (BIA) 3. Identify preventive controls 4. Develop recovery strategies 5. Develop the contingency plan 6. Test the plan and conduct training and exercises 7. Ma
Includes getting critical systems to another environment while repair of the original facilities is under way - getting the right people to the right places - and performing business in a different mode until regular conditions are back in place
Includes internal and external communications structure and roles. identifies specific individuals who will communicate with external entities. contains predeveloped statements that are to be released
Focuses on malware - hackers - intrusions - attacks - and other security issues. outlines procedures for incident response
4. What format does management want to see in the BCP?
65%
They want information stated in monetary - quantitative terms - not in subjective - qualitative terms.
Object code - source code - libraries - patches and fixes
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
5. What is the main limitation of insurance coverage?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Full-Interruption Test
The least critical functions... it ensures that the critical operations of the company are not negatively affected
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
Fortification of the facility in its construction materials - redundant servers and communications links - power lines coming in through different transformers - redundant vendor support - purchasing of insurance - purchasing of UPS and generators -
The most intrusive test to regular operations and business productivity. the original site is shut down - and processing takes place at the alternate site. this test takes a lot of planning and coordination but it can reveal many holes in the plan. f
7. Calling Tree
Required roles - Required resources - Input and output mechanisms - Workflow steps - Required time for completion - How they interface with other processes
A document that outlines who should be contacted in the event of a disaster - in what order - and who is responsible for doing the calling
Copies of the BCP are distributed to the different departments and functional areas for review
Provides methods and procedures for dealing with longer-term outages and disaster.
8. Should the BCP team be responsible for setting up and maintaining the company's data classification procedures?
No - but the team may recognize that the company is at risk because it does not have these procedures in place
1. Select individuals to interview for data gathering 2. Create data-gathering techniques (surveys - questionnaires - qualitative and quantitative approaches) 3. Identify the company's critical business functions 4. Identify the resources these funct
It requires less resources and time
The outage time that can be endured by a company
9. What are some examples of teams a company may need to construct - train - and have available in the event of a disaster?
Damage assessment team - legal team - media relations team - network recovery team - relocation team - restoration team - salvage team - security team - telecommunications team
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
It's used when threats are identified that cannot be prevented. Taking on the full risk of these threats is often dangerous
Responsibility: each individual involved should have their responsibilities spelled out in writing and the tasks should be assigned to the individual most situated to handle it - Authority: you need to know what leaders are going to step up to the pl
10. What are some of the resources that would be required for individual business processes?
Contact the local authorities
Includes internal and external communications structure and roles. identifies specific individuals who will communicate with external entities. contains predeveloped statements that are to be released
A leased or rented facility that supplies the basic environment - electrical wiring - air conditioning - plumbing and flooring - but none of the equipment or additional services. It may take weeks to get the site activated and ready for work. This is
Computer systems - Personnel - Procedures - Tasks - Supplies - Vendor support
11. At what point can a company have real confidence in a developed plan?
After it has been tested
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
An estimate of how long it will take to fix a piece of equipment and get it back into production
A document that outlines who should be contacted in the event of a disaster - in what order - and who is responsible for doing the calling
12. Warm Site
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. Where should the business continuity and disaster recovery plans be stored when they're completed?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. Asynchronous Replication
Hot Site - Warm Site - Colde Site
Make business continuity a part of every business decision - Insert the maintenance responsibilities into job description - Include maintenance in personnel evaluations - Perform internal audits that include disaster recovery and continuity documenta
The plans that determine the steps needed to protect the company in the event that a senior executive retires - leaves the company - or is killed. also details the people who would step in and assume responsibility
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
15. Differential Backup
It needs to ensure the safety of employees - It needs to ensure an adequate environment is provided (power - facility infrastructure - water - HVAC) - It needs to ensure that the necessary equipment and supplies are present and in working order - It
Back up the files that have been modified since the LAST FULL BACKUP. this process does not change the archive bit value
Makes copies of files as they are modified and periodically transmits them to an offsite backup site. The transmission doesn't happen in real time but is carried out in batches
Responsibility: each individual involved should have their responsibilities spelled out in writing and the tasks should be assigned to the individual most situated to handle it - Authority: you need to know what leaders are going to step up to the pl
16. Full Backup
Each disk would have a corresponding mirrored disk that contains the exact same information
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
The employees who carry out the most critical functions of the company who must be put back to work first
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
17. When should a Damage Assessment Team change into Recovery mode?
An estimate of how long it will take to fix a piece of equipment and get it back into production
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
Objective-to-task mapping - Resource-to-task mapping - Milestones - Budget estimates - Success factors - Deadlines
Provides methods and procedures for dealing with longer-term outages and disaster.
18. Salvage Team
Each disk would have a corresponding mirrored disk that contains the exact same information
Responsible for starting the recovery of the original site. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and install equipment and applicat
Makes copies of files as they are modified and periodically transmits them to an offsite backup site. The transmission doesn't happen in real time but is carried out in batches
The employees who carry out the most critical functions of the company who must be put back to work first
19. What are loss criteria that can be applied to individual threats that were identified in the BIA?
Required roles - Required resources - Input and output mechanisms - Workflow steps - Required time for completion - How they interface with other processes
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
The outage time that can be endured by a company
20. How can an organization keep the BCP up to date?
Make business continuity a part of every business decision - Insert the maintenance responsibilities into job description - Include maintenance in personnel evaluations - Perform internal audits that include disaster recovery and continuity documenta
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
The client pays a monthly fee to retain the right to use the facility in a time of need and then incurs a large activation fee when the facility actually has to be used... most recovery site contracts do not promise to house the company in need at a
21. Incremental Backup
Hot Site - Warm Site - Colde Site
Backup all the files that have changed since the last full or incremental backup. this process sets the archive bit to 0
Contact the local authorities
Establishes senior management and a headquarters after a disaster. outlines roles and authorities - orders of succession - and individual role tasks
22. Hot Site
A facility that is leased or rented and is fully configured and ready to operate within a few hours... the only missing resources are usually the data - which will be retrieved from a backup site - and the people who are processing the data. The equi
A method of transmitting data offsite - but it usually only includes moving the journal or transaction logs to the offsite facility - not the actual files. these logs contain the changes that have taken place to the individual files. Journaling is ef
No - but the team may recognize that the company is at risk because it does not have these procedures in place
A promise that a service will be fulfilled within a certain timeframe
23. Structured Walk-Through Test
One site is equipped and configured exactly like the primary site - which serves as a redundant environment. these sites are owned by the company and are mirrors of the original production environment... this is one of the most expensive backup facil
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
Representatives from each department or functional area come together to over the plan to ensure its accuracy
24. What functions should be moved back first during the Reconstitution Phase?
Since the software vendor provides its customers with only the compiled version of its applications - it's difficult for the customer to continue to use it if the vendor goes out of business. So the customer should set up a Software Escrow agreement
The employees who carry out the most critical functions of the company who must be put back to work first
To resume business as quickly as possible - spending the least amount of money
The least critical functions... it ensures that the critical operations of the company are not negatively affected
25. Parallel Test
A new type of coverage that insures losses caused by denial-of-service attacks - malware damages - hackers - electronic theft - privacy-related lawsuits and more
After it has been tested
The least critical functions... it ensures that the critical operations of the company are not negatively affected
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
26. Crisis Communications Plan
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
Includes internal and external communications structure and roles. identifies specific individuals who will communicate with external entities. contains predeveloped statements that are to be released
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
27. How should a company - during the BIA phase - find out what the risks of its geographical location are? And how should they find out how to access emergency zones?
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
Focuses on malware - hackers - intrusions - attacks - and other security issues. outlines procedures for incident response
1. Develop the continuity planning policy statement 2. Conduct the business impact analysis (BIA) 3. Identify preventive controls 4. Develop recovery strategies 5. Develop the contingency plan 6. Test the plan and conduct training and exercises 7. Ma
Contact the local authorities
28. Service Level Agreement (SLA)
Make business continuity a part of every business decision - Insert the maintenance responsibilities into job description - Include maintenance in personnel evaluations - Perform internal audits that include disaster recovery and continuity documenta
A promise that a service will be fulfilled within a certain timeframe
1. Select individuals to interview for data gathering 2. Create data-gathering techniques (surveys - questionnaires - qualitative and quantitative approaches) 3. Identify the company's critical business functions 4. Identify the resources these funct
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
29. As a general rule of thumb - how far away should a backup facility be from the main facility?
After it has been tested
It should be far enough away from the original site so one disaster does not take out both locations... alternate facilities should be at a bare minimum at least five miles away from the primary site - while 15 miles is recommended for most low-to-me
Computer systems - Personnel - Procedures - Tasks - Supplies - Vendor support
It's used when threats are identified that cannot be prevented. Taking on the full risk of these threats is often dangerous
30. Restoration Team
Responsible for starting the recovery of the original site. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and install equipment and applicat
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
One site is equipped and configured exactly like the primary site - which serves as a redundant environment. these sites are owned by the company and are mirrors of the original production environment... this is one of the most expensive backup facil
Responsible for getting the alternate site into a working and functioning environment. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and ins
31. Why do you need a combination of consultants and employees on the BCP team?
The business continuity process isn't integrated into the change management process - infrastructure and environment changes occur - reorganization of the company - layoffs - or mergers occur - changes in hardware - software - and applications occur
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
Consultants are experts in the field and know the necessary steps - questions to ask - and issues to look for - and they can also offer general reasonable advice. In-house employees know their company intimately and have a full understanding of how c
Identifying regulatory and legal requirements that must be met - Identifying all possible vulnerabilities and threats - Estimating the possibilities of these threats and the loss potential - Performing a BIA - Outlining which departments - systems -
32. What are some appropriate and cost-effective preventative methods to better fortify a company from the impacts recognized in the BIA?
The most intrusive test to regular operations and business productivity. the original site is shut down - and processing takes place at the alternate site. this test takes a lot of planning and coordination but it can reveal many holes in the plan. f
Fortification of the facility in its construction materials - redundant servers and communications links - power lines coming in through different transformers - redundant vendor support - purchasing of insurance - purchasing of UPS and generators -
A functional analysis in which a team collects data through interviews - workshops - and documentary sources; documents business functions - activities - and transactions (maybe in a set of flow charts); develops a hierarchy of business functions; an
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
33. What is one of the big issues with VoIP and disaster recovery?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Why does Insurance exist?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What are some reasons why BCPs become outdated?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What is the general structure of a BCP?
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
1. Initiation Phase: goal statements - overview of concepts - roles and teams definitions - task definitions 2. Activation Phase: notification steps - damage assessment - plan activation 3. Recovery Phase: move to alternate site - restore processes -
Determines the cause of the disaster - Determines the potential for further damage - Identifies the affected business functions and areas - Identifies the level of functionality for the critical resources - Identifies the resources that must be repla
It's used when threats are identified that cannot be prevented. Taking on the full risk of these threats is often dangerous
37. If a company loses computing capabilities for a week - what is the chance they will go out of business (on average)?
A new type of coverage that insures losses caused by denial-of-service attacks - malware damages - hackers - electronic theft - privacy-related lawsuits and more
To resume business as quickly as possible - spending the least amount of money
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
65%
38. How frequently should a company's insurance be reviewed?
Make business continuity a part of every business decision - Insert the maintenance responsibilities into job description - Include maintenance in personnel evaluations - Perform internal audits that include disaster recovery and continuity documenta
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
Annually
39. Disk Shadowing
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
The plans that determine the steps needed to protect the company in the event that a senior executive retires - leaves the company - or is killed. also details the people who would step in and assume responsibility
1. Initiation Phase: goal statements - overview of concepts - roles and teams definitions - task definitions 2. Activation Phase: notification steps - damage assessment - plan activation 3. Recovery Phase: move to alternate site - restore processes -
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
40. Simulation Test
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
Management support
65%
41. Disaster Recovery Plan
It has to figure out what the company needs to do to actually recover the items it has identified as being so important to the organization overall... the BIA provides the footprint
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
They want information stated in monetary - quantitative terms - not in subjective - qualitative terms.
42. Business Resumption Plan
Responsible for starting the recovery of the original site. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and install equipment and applicat
The business continuity process isn't integrated into the change management process - infrastructure and environment changes occur - reorganization of the company - layoffs - or mergers occur - changes in hardware - software - and applications occur
It has to figure out what the company needs to do to actually recover the items it has identified as being so important to the organization overall... the BIA provides the footprint
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
43. IT Contingency Plan
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
When it is time for the company to move back into its original site or a new site
Hot Site - Warm Site - Colde Site
Management support
44. Rolling Hot Site (Mobile Hot Site)
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
A type of facility-backup option where the back of a large truck or a trailer is turned into a data processing or working area (typically used by military organizations and large insurance companies)
A leased or rented facility that supplies the basic environment - electrical wiring - air conditioning - plumbing and flooring - but none of the equipment or additional services. It may take weeks to get the site activated and ready for work. This is
No - but the team may recognize that the company is at risk because it does not have these procedures in place
45. Who should be responsible for notifying the appropriate authorities and who would those authorities be?
One person should be responsible... the authorities are the police department - security guards - fire department - emergency rescue - and management
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
46. Continuity Planning Policy Statement
An estimate of how long it will take to fix a piece of equipment and get it back into production
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
A document that lays out the scope of the BCP project - the team member roles - and the goals of the project. it outlines what needs to be accomplished after the team communicates with management and comes to agreement on the terms of the project
The employees who carry out the most critical functions of the company who must be put back to work first
47. In terms of software backups - what should your BCP team address?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. Who should be involved in the Business Continuity and Disaster Recovery plans? In what part of the process?
A document that lays out the scope of the BCP project - the team member roles - and the goals of the project. it outlines what needs to be accomplished after the team communicates with management and comes to agreement on the terms of the project
Present it to management for written approval
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
49. What issues does a company need to look at when determining when it should move into Reconstitution Phase?
It needs to ensure the safety of employees - It needs to ensure an adequate environment is provided (power - facility infrastructure - water - HVAC) - It needs to ensure that the necessary equipment and supplies are present and in working order - It
Objective-to-task mapping - Resource-to-task mapping - Milestones - Budget estimates - Success factors - Deadlines
If the company does not practice due care - the insurance company may not be legally obligated to pay if a disaster hits... this is why it's important to read and understand the fine print
Hot Site - Warm Site - Colde Site
50. Disk Duplexing
Required roles - Required resources - Input and output mechanisms - Workflow steps - Required time for completion - How they interface with other processes
There is more than one disk controller - so if one fails - the other is ready and available
Responsibility: each individual involved should have their responsibilities spelled out in writing and the tasks should be assigned to the individual most situated to handle it - Authority: you need to know what leaders are going to step up to the pl
Committing fully to the BCP - Setting policy and goals - Making available the necessary funds and resources - Taking responsibility for the outcome of the development of the BCP - Appointing a team for the process