SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Business Continuity And Disaster Recovery
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Full Backup
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
65%
No - but the team may recognize that the company is at risk because it does not have these procedures in place
An estimate of how long it will take to fix a piece of equipment and get it back into production
2. Occupant Emergency Plan
Backup all the files that have changed since the last full or incremental backup. this process sets the archive bit to 0
An estimate of how long it will take to fix a piece of equipment and get it back into production
Focuses on how to re-create the necessary business processes that need to be reestablished instead of focusing on IT components
Establishes personnel safety and evacuation procedures
3. NIST Steps for Business Continuity
When it is time for the company to move back into its original site or a new site
1. Develop the continuity planning policy statement 2. Conduct the business impact analysis (BIA) 3. Identify preventive controls 4. Develop recovery strategies 5. Develop the contingency plan 6. Test the plan and conduct training and exercises 7. Ma
Use scenario-based exercises as a group to see what issues might crop up
Back up the files that have been modified since the LAST FULL BACKUP. this process does not change the archive bit value
4. Executive Succession Planning
Typically a copy is stored at the BCP coordinator's home - and another copy is stored at the offsite facility... when they are stored offsite - they need to be stored in a way that provides just as much protection as the primary site would provide
Required roles - Required resources - Input and output mechanisms - Workflow steps - Required time for completion - How they interface with other processes
The plans that determine the steps needed to protect the company in the event that a senior executive retires - leaves the company - or is killed. also details the people who would step in and assume responsibility
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
5. Calling Tree
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
A document that outlines who should be contacted in the event of a disaster - in what order - and who is responsible for doing the calling
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
Fortification of the facility in its construction materials - redundant servers and communications links - power lines coming in through different transformers - redundant vendor support - purchasing of insurance - purchasing of UPS and generators -
6. Restoration Team
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
At the intersection of the cost of disruption and the cost to recover
Responsible for getting the alternate site into a working and functioning environment. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and ins
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
7. Synchronous Replication
There is more risk for the organization because replacement systems won't be available... that's why many organizations have moved to commercial off the shelf (COTS) products. they want to make sure replacement is possible
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
The primary and secondary copies are always in sync - which provides true real-time duplication
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
8. Cyberinsurance
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
A new type of coverage that insures losses caused by denial-of-service attacks - malware damages - hackers - electronic theft - privacy-related lawsuits and more
Prepared actions that are developed to help people in a crisis situation better cope with the disruption. Protection of life is of the utmost importance and should be dealt with first before looking to save material objects!
9. Disaster Recovery Plan
The primary and secondary copies are always in sync - which provides true real-time duplication
The file system sets the archive bit of the file to 1 when a file is modified or created
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
The client pays a monthly fee to retain the right to use the facility in a time of need and then incurs a large activation fee when the facility actually has to be used... most recovery site contracts do not promise to house the company in need at a
10. Service Level Agreement (SLA)
A promise that a service will be fulfilled within a certain timeframe
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
A new type of coverage that insures losses caused by denial-of-service attacks - malware damages - hackers - electronic theft - privacy-related lawsuits and more
11. Emergency Response Procedures
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
Reduce the risk of financial loss by improving the company's ability to recover and restore operations
Prepared actions that are developed to help people in a crisis situation better cope with the disruption. Protection of life is of the utmost importance and should be dealt with first before looking to save material objects!
One person should be responsible... the authorities are the police department - security guards - fire department - emergency rescue - and management
12. When should a Damage Assessment Team change into Recovery mode?
A leased or rented facility that supplies the basic environment - electrical wiring - air conditioning - plumbing and flooring - but none of the equipment or additional services. It may take weeks to get the site activated and ready for work. This is
A document that outlines who should be contacted in the event of a disaster - in what order - and who is responsible for doing the calling
Provides methods and procedures for dealing with longer-term outages and disaster.
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
13. In terms of software backups - what should your BCP team address?
14. Asynchronous Replication
All data are backed up and saved to some type of storage media. backup and restoration processes are very simplistic and straightforward with this method
To resume business as quickly as possible - spending the least amount of money
Backing up business data to tapes that are then manually transferred to an offsite facility by a courier or an employee... with automatic tape vaulting - the data are sent over a serial line to a backup tape system at the offsite facility. Electronic
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
15. Reciprocal Agreement (Mutual Aid)
Includes getting critical systems to another environment while repair of the original facilities is under way - getting the right people to the right places - and performing business in a different mode until regular conditions are back in place
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
Make business continuity a part of every business decision - Insert the maintenance responsibilities into job description - Include maintenance in personnel evaluations - Perform internal audits that include disaster recovery and continuity documenta
A type of policy in which the insurance company will pay for specified expenses and lost earnings in the event that a company is forced out of business for a certain length of time. another policy can be bought that insures accounts receivable - so i
16. IT Contingency Plan
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
The business continuity process isn't integrated into the change management process - infrastructure and environment changes occur - reorganization of the company - layoffs - or mergers occur - changes in hardware - software - and applications occur
Present it to management for written approval
To minimize the effects of a disaster and to take the necessary steps to ensure that the resources - personnel - and business processes are able to resume operation in a timely manner. A disaster recovery plan is carried out when everything is still
17. How are offsite backup facility contracts usually established?
A type of policy in which the insurance company will pay for specified expenses and lost earnings in the event that a company is forced out of business for a certain length of time. another policy can be bought that insures accounts receivable - so i
A type of facility-backup option where the back of a large truck or a trailer is turned into a data processing or working area (typically used by military organizations and large insurance companies)
The client pays a monthly fee to retain the right to use the facility in a time of need and then incurs a large activation fee when the facility actually has to be used... most recovery site contracts do not promise to house the company in need at a
Typically a copy is stored at the BCP coordinator's home - and another copy is stored at the offsite facility... when they are stored offsite - they need to be stored in a way that provides just as much protection as the primary site would provide
18. Mean Time To Repair (MTTR)
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
They want information stated in monetary - quantitative terms - not in subjective - qualitative terms.
An estimate of how long it will take to fix a piece of equipment and get it back into production
19. Parallel Test
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
The most intrusive test to regular operations and business productivity. the original site is shut down - and processing takes place at the alternate site. this test takes a lot of planning and coordination but it can reveal many holes in the plan. f
Makes copies of files as they are modified and periodically transmits them to an offsite backup site. The transmission doesn't happen in real time but is carried out in batches
20. What is the difference between preventive mechanisms and recovery strategies?
Computer systems - Personnel - Procedures - Tasks - Supplies - Vendor support
Includes getting critical systems to another environment while repair of the original facilities is under way - getting the right people to the right places - and performing business in a different mode until regular conditions are back in place
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
When it detects danger to human life - When it detects danger to state or national security - When it detects damage to the facility - When it detects damage to critical systems
21. Tape Vaulting
Responsibility: each individual involved should have their responsibilities spelled out in writing and the tasks should be assigned to the individual most situated to handle it - Authority: you need to know what leaders are going to step up to the pl
Backing up business data to tapes that are then manually transferred to an offsite facility by a courier or an employee... with automatic tape vaulting - the data are sent over a serial line to a backup tape system at the offsite facility. Electronic
A type of facility-backup option where the back of a large truck or a trailer is turned into a data processing or working area (typically used by military organizations and large insurance companies)
Establishes senior management and a headquarters after a disaster. outlines roles and authorities - orders of succession - and individual role tasks
22. What tasks should the BCP team carry out and have addressed in the resulting plan?
Define essential business functions and supporting departments - Identify interdependencies between these functions and departments - Discover all possible disruptions that could affect the mechanisms necessary to allow these departments to function
The primary and secondary copies are always in sync - which provides true real-time duplication
Damage assessment team - legal team - media relations team - network recovery team - relocation team - restoration team - salvage team - security team - telecommunications team
Makes copies of files as they are modified and periodically transmits them to an offsite backup site. The transmission doesn't happen in real time but is carried out in batches
23. Disk Mirroring
1. Initiation Phase: goal statements - overview of concepts - roles and teams definitions - task definitions 2. Activation Phase: notification steps - damage assessment - plan activation 3. Recovery Phase: move to alternate site - restore processes -
Each disk would have a corresponding mirrored disk that contains the exact same information
Responsible for starting the recovery of the original site. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and install equipment and applicat
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
24. Mean Time Between Failures (MTBF)
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
25. Structured Walk-Through Test
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
Responsible for getting the alternate site into a working and functioning environment. Needs to know how to install OSes - configure workstations and servers - string wiring and cabling - set up the network and configure networking services - and ins
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Preventive mechanisms are put into place to try to reduce the possibility of the company experiencing a disaster and - if a disaster does hit - to lessen the amount of damage that will take place - Recovery strategies are processes on how to rescue t
26. What are some of the characteristics you should look at when creating a BIA?
Business Resumption Plan - Continuity of Operations Plan (COOP) - IT Contingency Plan - Crisis Communications Plan - Cyber Incident Response Plan - Disaster Recovery Plan
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
Contact the local authorities
27. Remote Journaling
A method of transmitting data offsite - but it usually only includes moving the journal or transaction logs to the offsite facility - not the actual files. these logs contain the changes that have taken place to the individual files. Journaling is ef
A facility that is leased or rented and is fully configured and ready to operate within a few hours... the only missing resources are usually the data - which will be retrieved from a backup site - and the people who are processing the data. The equi
Backup all the files that have changed since the last full or incremental backup. this process sets the archive bit to 0
Focuses on how to recover various IT mechanisms after a disaster. whereas a contingency plan is usually for nondisasters - a disaster recover plan is for disasters that require IT processing to take place at another facility
28. Should the BCP team be responsible for setting up and maintaining the company's data classification procedures?
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
Provides methods and procedures for dealing with longer-term outages and disaster.
Identifying regulatory and legal requirements that must be met - Identifying all possible vulnerabilities and threats - Estimating the possibilities of these threats and the loss potential - Performing a BIA - Outlining which departments - systems -
No - but the team may recognize that the company is at risk because it does not have these procedures in place
29. What are the three main types of leased or rented offsite facilities?
Representatives from each department or functional area come together to over the plan to ensure its accuracy
The most intrusive test to regular operations and business productivity. the original site is shut down - and processing takes place at the alternate site. this test takes a lot of planning and coordination but it can reveal many holes in the plan. f
Hot Site - Warm Site - Colde Site
Reduce the risk of financial loss by improving the company's ability to recover and restore operations
30. What are loss criteria that can be applied to individual threats that were identified in the BIA?
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
Management support
Establishes personnel safety and evacuation procedures
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
31. What is the general structure of a BCP?
Establishes personnel safety and evacuation procedures
Plan for systems - networks - and major applications recovery procedures after disruptions. a contingency plan should be developed for each major system and application
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
1. Initiation Phase: goal statements - overview of concepts - roles and teams definitions - task definitions 2. Activation Phase: notification steps - damage assessment - plan activation 3. Recovery Phase: move to alternate site - restore processes -
32. Business Process
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
Representatives from at least each of the following departments must be involved with not only the planning stages but also the testing and implementation stages: - Business Units - Senior Management - IT Department - Security Department - Communicat
It requires less resources and time
33. What are the three types of disruptions that a facility can have and what does each mean?
When the power goes on the computers - it's also going to go out for the phones
Representatives from each department or functional area come together to over the plan to ensure its accuracy
Nondisaster: a disruption in service due to a device malfunction or failure - Disaster: an event that causes the entire facility to be unusable for a day or longer - Catastrophe: a major disruption that destroys the facility altogether --> requires b
Lead the BCP team and oversee the development - implementation - and testing of the continuity and disaster recovery plans... this person needs to have direct access to management and have the credibility and authority to carry out leadership tasks
34. What are some of the things you have to consider when it comes to supply and tech recovery?
Maximum tolerable downtime - Operational disruption and productivity - Financial considerations - Regulatory responsibilities - Reputation
Network and computer equipment - Voice and data communications resources - Human Resources - Transportation of equipment and personnel - Environment issues (HVAC) - Data and personnel security issues - Supplies (paper - forms - cabling - and so on) -
Company A agrees to allow company B to use its facilities if company B is hit by a disaster - and vice versa. This is a cheaper way to go than the other offsite choices - but is not always the best choice because most environments are maxed out perta
They should make sure there are at least two copies of the company's operating system and critical applications
35. Simulation Test
Provides methods and procedures for dealing with longer-term outages and disaster.
Object code - source code - libraries - patches and fixes
They want information stated in monetary - quantitative terms - not in subjective - qualitative terms.
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
36. How should a team break down recovery strategies?
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
Business process recovery - Facility recovery - Supply and technology recovery - User environment recovery - Data recovery
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
It's used when threats are identified that cannot be prevented. Taking on the full risk of these threats is often dangerous
37. Who should be responsible for notifying the appropriate authorities and who would those authorities be?
Establishes personnel safety and evacuation procedures
Typically a copy is stored at the BCP coordinator's home - and another copy is stored at the offsite facility... when they are stored offsite - they need to be stored in a way that provides just as much protection as the primary site would provide
One person should be responsible... the authorities are the police department - security guards - fire department - emergency rescue - and management
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
38. What is the most critical part of establishing and maintaining a current continuity plan?
A set of interrelated steps linked through specific decision activities to accomplish a specific task... business processes have starting and ending points and are repeatable
It has to figure out what the company needs to do to actually recover the items it has identified as being so important to the organization overall... the BIA provides the footprint
Management support
Establishes senior management and a headquarters after a disaster. outlines roles and authorities - orders of succession - and individual role tasks
39. What are the three main types of threats?
Manmade: arsonist - terrorist - a simple mistake - Natural: tornadoes - floods - hurricanes - or earthquakes - Technical: data corruption - loss of power - device failure - or loss of a data communications line
Business Resumption Plan - Continuity of Operations Plan (COOP) - IT Contingency Plan - Crisis Communications Plan - Cyber Incident Response Plan - Disaster Recovery Plan
When the power goes on the computers - it's also going to go out for the phones
Management support
40. Disk Duplexing
Lead the BCP team and oversee the development - implementation - and testing of the continuity and disaster recovery plans... this person needs to have direct access to management and have the credibility and authority to carry out leadership tasks
There is more than one disk controller - so if one fails - the other is ready and available
1. Develop the continuity planning policy statement 2. Conduct the business impact analysis (BIA) 3. Identify preventive controls 4. Develop recovery strategies 5. Develop the contingency plan 6. Test the plan and conduct training and exercises 7. Ma
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
41. Once the project plan is completed - what should be done before further steps are taken?
Consultants are experts in the field and know the necessary steps - questions to ask - and issues to look for - and they can also offer general reasonable advice. In-house employees know their company intimately and have a full understanding of how c
When the power goes on the computers - it's also going to go out for the phones
Present it to management for written approval
It's used when threats are identified that cannot be prevented. Taking on the full risk of these threats is often dangerous
42. What is one of the best ways to work through the details of a BIA?
Use scenario-based exercises as a group to see what issues might crop up
The estimated lifetime of a piece of equipment... calculated by the vendor of the equipment or a third party
Done to ensure that the specific systems can actually perform adequately at the alternate offsite facility. some systems are moved to the alternate site and processing takes place. the results are compared with the regular processing that is done at
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
43. What does the BCP team need to understand about critical business processes?
A functional analysis in which a team collects data through interviews - workshops - and documentary sources; documents business functions - activities - and transactions (maybe in a set of flow charts); develops a hierarchy of business functions; an
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
The primary and secondary data volumes are only a few milliseconds out of sync - so the replication is nearly real-time
Required roles - Required resources - Input and output mechanisms - Workflow steps - Required time for completion - How they interface with other processes
44. Why does Insurance exist?
45. What are some appropriate and cost-effective preventative methods to better fortify a company from the impacts recognized in the BIA?
Loss in reputation and public confidence - Loss of competitive advantages - Increase in operational expenses - Violations of contract agreements - Violations of legal and regulatory requirements - Delayed income costs - Loss in revenue - Loss in pr
Includes internal and external communications structure and roles. identifies specific individuals who will communicate with external entities. contains predeveloped statements that are to be released
Fortification of the facility in its construction materials - redundant servers and communications links - power lines coming in through different transformers - redundant vendor support - purchasing of insurance - purchasing of UPS and generators -
All employees who participate in operational and support functions - or their representatives - come together to practice executing the disaster recovery plan based on a specific scenario. the scenario is used to test the reaction of each operational
46. Cyber Incident Response Plan
A leased or rented facility that usually partially configured with some equipment (peripheral devices) - but not the actual computers... it's usually a hot site without the expensive equipment. This is the most widely-used model... it is less expensi
Focuses on malware - hackers - intrusions - attacks - and other security issues. outlines procedures for incident response
Objective-to-task mapping - Resource-to-task mapping - Milestones - Budget estimates - Success factors - Deadlines
Use scenario-based exercises as a group to see what issues might crop up
47. How do you determine how much coverage to obtain?
Base it off of the probability of the threat becoming real and the loss potential. the goal is to make sure the insurance coverage fills in the gap of what the current preventative countermeasures cannot protect against
The plans that determine the steps needed to protect the company in the event that a senior executive retires - leaves the company - or is killed. also details the people who would step in and assume responsibility
65%
Focuses on malware - hackers - intrusions - attacks - and other security issues. outlines procedures for incident response
48. What is the main reason to develop Business Continuity and Disaster Recovery plans?
49. Redundant Site
After it has been tested
One site is equipped and configured exactly like the primary site - which serves as a redundant environment. these sites are owned by the company and are mirrors of the original production environment... this is one of the most expensive backup facil
Establishes personnel safety and evacuation procedures
Annually
50. Disk Shadowing
There is more than one disk controller - so if one fails - the other is ready and available
When it is time for the company to move back into its original site or a new site
Data are dynamically created and maintained as images on two or more identical disks. this method is used to ensure the availability of data and to provide a fault-tolerant solution by duplicating hardware and maintaining more than one copy of the in
Typically a copy is stored at the BCP coordinator's home - and another copy is stored at the offsite facility... when they are stored offsite - they need to be stored in a way that provides just as much protection as the primary site would provide