Intrusion Detection Chapter 3

25 July 2022
4.7 (114 reviews)
26 test answers

Unlock all answers in this set

Unlock answers (22)
question
Considered to be the traditional "lock and copy" approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive.
answer
online backup applications
question
A ____ is an agency that provides physical facilities in the event of a disaster for a fee.
answer
service bureau
question
A resumption location known as a ____ or a _______ is a fully configured computer facility capable of establishing operations at a moment's notice.
answer
hot site, mirrored site
question
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.
answer
SaaS
question
A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.
answer
nondisclosure agreement
question
When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or on a host platform.
answer
virtual machine
question
Some data is required by law to be retained and stored for years.
answer
True
question
A(n) ____ is an extension of an organization's intranet into cloud computing.
answer
private cloud
question
For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.
answer
False
question
RAID is an acronym for Redundant Array of Incident-Recovery Drives.
answer
True
question
One real-time protection and data backup strategy is the use of mirroring.
answer
True
question
A(n) ____ is an agreement in which the client agrees not to use the vendor's services to compete directly with the vendor, and for the client not to use vendor information to gain a better deal with another vendor.
answer
covenant not to compete
question
A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.
answer
statement of indemnification
question
Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and the duration of storage.
answer
retention
question
A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization.
answer
moderate
question
An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.
answer
disk-to-disk-to-cloud
question
A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.
answer
service agreement
question
A ____ is a synonym for a virtualization application.
answer
hypervisor
question
Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing backups of data.
answer
robustness
question
A(n) ____ backup only archives the files that have been modified since the last backup.
answer
incremental
question
____ are used for recovery from disasters that threaten on-site backups.
answer
data archives
question
A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and communications methods to provide an online storage environment.
answer
network-attached storage
question
RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which data segments are written in turn to each disk drive in the array.
answer
disk striping
question
A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facility simultaneously.
answer
time-share
question
Database shadowing techniques are generally used in organizations that do not need immediate data recovery after an incident or disaster.
answer
False
question
____ uses a number of hard drives to store information across multiple drive units.
answer
RAID