You are on page 1of 8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

Quiz Submissions - Chapter 3 Reviewer


Aavish Krishali (username: aavish.krishali)
Attempt 1
Written: Oct 1, 2014 4:58 PM - Oct 1, 2014 6:03 PM

Submission View
Released: Sep 6, 2013 4:13 PM
Chapter 3 BCM
Question 1

1 / 1 point

For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.
False
True
Question 2

1 / 1 point

Some data is required by law to be retained and stored for years.


True
False
Question 3

1 / 1 point

RAID is an acronym for Redundant Array of Incident-Recovery Drives.


False
True
Question 4

1 / 1 point

One real-time protection and data backup strategy is the use of mirroring.
True
False
Question 5

1 / 1 point

Database shadowing techniques are generally used in organizations that do not need immediate data recovery after an
incident or disaster.
False
True
Question 6

1 / 1 point

____ are used for recovery from disasters that threaten on-site backups.
Data archives
Cloud storage sites
Data backups
Electronic vaulting sites
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

1/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

Question 7

0 / 1 point

Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and
the duration of storage.
replication
business resumption
incident response
retention
Question 8

1 / 1 point

A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information
systems that have ____ priority within an organization.
critical
high
moderate
low
Question 9

1 / 1 point

A(n) ____ is an extension of an organizations intranet into cloud computing.


private cloud
community cloud
public cloud
application cloud
Question 10

1 / 1 point

An organization aggregates all local backups to a central repository and then backs up that repository to an online
vendor, with a ____ backup strategy.
disk-to-disk-to-tape
differential
RAID
disk-to-disk-to-cloud
Question 11

1 / 1 point

A(n) ____ backup only archives the files that have been modified since the last backup.
daily
differential
incremental
copy
Question 12

1 / 1 point

____ uses a number of hard drives to store information across multiple drive units.
Legacy backup
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

2/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

RAID
Continuous database protection
Virtualization
Question 13

1 / 1 point

RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which
data segments are written in turn to each disk drive in the array.
disk mirroring
disk striping
disk duplexing
disk coding
Question 14

1 / 1 point

Considered to be the traditional lock and copy approach to database backup, _____ require the database to be
inaccessible while a backup is created to a local drive.
continuous database protections
online backup applications
legacy backup applications
RAID Level 1+0 applications
Question 15

1 / 1 point

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations
that lease ____ are in effect using a preconfigured set of applications on someone elses systems, it is reasonable to
ask that the service agreement include contingencies for recovery.
servers
PaaS
IaaS
SaaS
Question 16

1 / 1 point

Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing
backups of data.
robustness
accuracy
speed
cost-effectiveness
Question 17

1 / 1 point

A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and
communications methods to provide an online storage environment.
storage area network
network-attached storage
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

3/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

remote journal
virtual machine monitor
Question 18

1 / 1 point

When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or
on a host platform.
virtual machine
host machine
hypervisor
VMware
Question 19

1 / 1 point

A ____ is a synonym for a virtualization application.


host platform
virtual machine
virtual hardware
hypervisor
Question 20

1 / 1 point

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a
moments notice.
mobile site
mirrored site
service bureau
hot site
Question 21

1 / 1 point

A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facility
simultaneously.
time-share
service bureau
cold site
mobile site
Question 22

1 / 1 point

A ____ is an agency that provides physical facilities in the event of a disaster for a fee.
time-share
service bureau
cold site
mobile site

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

4/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

Question 23

1 / 1 point

A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.
memorandum of understanding
mutual agreement
service agreement
time-share agreement
Question 24

1 / 1 point

A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 25

1 / 1 point

A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 26

1 / 1 point

A(n) ____ is an agreement in which the client agrees not to use the vendors services to compete directly with the
vendor, and for the client not to use vendor information to gain a better deal with another vendor.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 27

1 / 1 point

A(n) ____________________ backup is a backup of a set of specified files, regardless of whether they have been
modified or otherwise flagged for backup.
Answer: copy
Question 28

1 / 1 point

RAID 5 drives can be ____________________, meaning they can be replaced without taking the entire system down.
Answer: hot swapped
Question 29

1 / 1 point

____________________ is the transfer of live transactions to an off-site facility.


Answer: Remote journaling
Question 30

0 / 1 point

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

5/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

A(n) ____________________ is a duplicate facility that needs only the latest data backups and the personnel to
function.
Answer: Hot site

(/hot site/)

Question 31

0 / 1 point

If an organization needs to plan for resumption and cannot justify the expense of an exclusive-use strategy, it can
choose a shared-use option. A(n) ____________________ operates like an exclusive-use site but it is leased in
conjunction with a business partner or sister organization.
Answer: time share

(/time-share/)

Question 32

9 / 9 points

Match each item with a statement below.


__1__

Applications that are made available to users over the Internet

__9__

Bulk transfer of data in batches to an off-site facility

1.

Software as a Service
(SaaS)

__2__

Development platforms that are made available to developers over the


Internet

2.

Platform as a Service
(PaaS)

__3__

Implementation in which a service provider makes computing resources


available over the Internet

3. Public cloud

__4__

Implementation in which several organizations share computing resources

__7__

Implementation of RAID Level 1

6. FTDS

__8__

Allows you to reboot a system from a CD-ROM

7. Disk mirroring

__6__

A RAID implementation that protects against loss of data access due to a


single components failure

8. Bare metal recovery

__5__

A RAID implementation that protects against data loss due to disk failure

4. Community cloud
5. FRDS

9. Electronic vaulting

Question 33

0 / 1 point

List the five key protection and recovery mechanisms that facilitate the restoration of critical information and the
continuation of business operations.
Delayed protection, real-time protection, server recovery, application recovery and site recovery.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 34

0 / 1 point

Briefly describe differential backup. What are some of the advantages and disadvantages of using differential backup?
A differential backup is the storage of all files that have changed or been added since the last full backup. The
advantage is that it reduces the space requirement and time to the backup but the downside is that if an incident
occurs multiple backups are needed to restored to restore a system.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 35

0 / 1 point

The market for consumer-grade tape backups has dwindled to a fraction of its former popularity in the last decade.
What are the primary drawbacks of tape backup?
Primary drawbacks of tape backup are the cost of specialized hardware to read tapes, cost involved in storing tapes
and reliability to restore from the tape.
This question has not been graded.
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

6/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 36

0 / 1 point

Even the best backups are inadequate unless they can be used to successfully restore systems to an operational state.
What are some of the questions that must be answered by a backup and recovery plan?
Each backup and recovery setting should be provided with complete recovery plans, including testing and rehearsal.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 37

0 / 1 point

One strategy for implementing server recovery and redundancy through mirroring servers uses hot, warm, and cold
servers. Explain how this strategy works.
In this strategy, the online primary server is the hot server and it provides the services necessary to support
operations. The warm server serves as an secondary server and services request from primary when it is down or
busy. The cold server is the administrator's test platform and should be identically configured to the hot and warm
servers. This is used to test new patches and avoid hot server going down. Should the hot server go down, the warm
server takes over as hot server as the hot server is bought up.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 38

0 / 1 point

What is the difference between remote journaling and electronic vaulting?


E-vaulting is the transferring bulk of data in batches to an off-site facility whereas remote journaling transfers live
transactions to an off-site thereby recording all changes.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 39

0 / 1 point

Briefly explain how database shadowing works.


Database shadowing, also known as data bank shadowing, is the storage of duplicate online transaction data, along
with the duplication of database at the remote site to a redundant server.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 40

0 / 1 point

Database replication focuses on the backup of multiple copies of the database for recovery purposes. Briefly describe
three types of database replication.
The 3 types of db replication are :
1. Snapshot replication: Copying data from one database to another
2.Merger replication: Merging data from multiple databases into a separate database.
3. Transaction replication: Using a master db for regular operations but periodically copying new and updated entries
to a backup db.
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

7/8

10/1/2014

Quizzes - 201443.31499-MGMT-1212-01 - BUSINESS CONTINUITY MGMT - Durham College

This question has not been graded.


The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 41

0 / 1 point

Using virtualization, an organization can take its existing hardware and deploy any other operating system and/or
application. There are several different levels of virtualization. Describe one of these: application-level virtualization.
This method virtualizes the OS layer so as to look to the application as the the expected OS, answering all necessary
application programming interface(API) call made by the application. The application perceives that it is interacting
with the host OS and the resources managed by it. This method is used to run application intended to run on nonnative OS.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 42

0 / 1 point

Explain how a mutual agreement would work as a shared-site resumption strategy.


A mutual agreement is a contract between two organization for each other to assist the other in the event of
disaster. This allow the organization to use the resources of the other without investing in hardware for
incidence/disaster recovery. It allows for the organization to save a lot of resources for disaster recovery but is
limited to the level of agreement and investment of resources from the other.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback

Attempt Score: 37 / 50 - 74
Overall Grade (highest attempt): 37 / 50 - 74
Close

https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0

8/8

You might also like