Professional Documents
Culture Documents
Submission View
Released: Sep 6, 2013 4:13 PM
Chapter 3 BCM
Question 1
1 / 1 point
For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.
False
True
Question 2
1 / 1 point
1 / 1 point
1 / 1 point
One real-time protection and data backup strategy is the use of mirroring.
True
False
Question 5
1 / 1 point
Database shadowing techniques are generally used in organizations that do not need immediate data recovery after an
incident or disaster.
False
True
Question 6
1 / 1 point
____ are used for recovery from disasters that threaten on-site backups.
Data archives
Cloud storage sites
Data backups
Electronic vaulting sites
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
1/8
10/1/2014
Question 7
0 / 1 point
Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and
the duration of storage.
replication
business resumption
incident response
retention
Question 8
1 / 1 point
A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information
systems that have ____ priority within an organization.
critical
high
moderate
low
Question 9
1 / 1 point
1 / 1 point
An organization aggregates all local backups to a central repository and then backs up that repository to an online
vendor, with a ____ backup strategy.
disk-to-disk-to-tape
differential
RAID
disk-to-disk-to-cloud
Question 11
1 / 1 point
A(n) ____ backup only archives the files that have been modified since the last backup.
daily
differential
incremental
copy
Question 12
1 / 1 point
____ uses a number of hard drives to store information across multiple drive units.
Legacy backup
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
2/8
10/1/2014
RAID
Continuous database protection
Virtualization
Question 13
1 / 1 point
RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which
data segments are written in turn to each disk drive in the array.
disk mirroring
disk striping
disk duplexing
disk coding
Question 14
1 / 1 point
Considered to be the traditional lock and copy approach to database backup, _____ require the database to be
inaccessible while a backup is created to a local drive.
continuous database protections
online backup applications
legacy backup applications
RAID Level 1+0 applications
Question 15
1 / 1 point
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations
that lease ____ are in effect using a preconfigured set of applications on someone elses systems, it is reasonable to
ask that the service agreement include contingencies for recovery.
servers
PaaS
IaaS
SaaS
Question 16
1 / 1 point
Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing
backups of data.
robustness
accuracy
speed
cost-effectiveness
Question 17
1 / 1 point
A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and
communications methods to provide an online storage environment.
storage area network
network-attached storage
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
3/8
10/1/2014
remote journal
virtual machine monitor
Question 18
1 / 1 point
When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or
on a host platform.
virtual machine
host machine
hypervisor
VMware
Question 19
1 / 1 point
1 / 1 point
A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a
moments notice.
mobile site
mirrored site
service bureau
hot site
Question 21
1 / 1 point
A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facility
simultaneously.
time-share
service bureau
cold site
mobile site
Question 22
1 / 1 point
A ____ is an agency that provides physical facilities in the event of a disaster for a fee.
time-share
service bureau
cold site
mobile site
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
4/8
10/1/2014
Question 23
1 / 1 point
A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.
memorandum of understanding
mutual agreement
service agreement
time-share agreement
Question 24
1 / 1 point
A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 25
1 / 1 point
A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 26
1 / 1 point
A(n) ____ is an agreement in which the client agrees not to use the vendors services to compete directly with the
vendor, and for the client not to use vendor information to gain a better deal with another vendor.
statement of indemnification
intellectual property assurance
nondisclosure agreement
covenant not to compete
Question 27
1 / 1 point
A(n) ____________________ backup is a backup of a set of specified files, regardless of whether they have been
modified or otherwise flagged for backup.
Answer: copy
Question 28
1 / 1 point
RAID 5 drives can be ____________________, meaning they can be replaced without taking the entire system down.
Answer: hot swapped
Question 29
1 / 1 point
0 / 1 point
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
5/8
10/1/2014
A(n) ____________________ is a duplicate facility that needs only the latest data backups and the personnel to
function.
Answer: Hot site
(/hot site/)
Question 31
0 / 1 point
If an organization needs to plan for resumption and cannot justify the expense of an exclusive-use strategy, it can
choose a shared-use option. A(n) ____________________ operates like an exclusive-use site but it is leased in
conjunction with a business partner or sister organization.
Answer: time share
(/time-share/)
Question 32
9 / 9 points
__9__
1.
Software as a Service
(SaaS)
__2__
2.
Platform as a Service
(PaaS)
__3__
3. Public cloud
__4__
__7__
6. FTDS
__8__
7. Disk mirroring
__6__
__5__
A RAID implementation that protects against data loss due to disk failure
4. Community cloud
5. FRDS
9. Electronic vaulting
Question 33
0 / 1 point
List the five key protection and recovery mechanisms that facilitate the restoration of critical information and the
continuation of business operations.
Delayed protection, real-time protection, server recovery, application recovery and site recovery.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 34
0 / 1 point
Briefly describe differential backup. What are some of the advantages and disadvantages of using differential backup?
A differential backup is the storage of all files that have changed or been added since the last full backup. The
advantage is that it reduces the space requirement and time to the backup but the downside is that if an incident
occurs multiple backups are needed to restored to restore a system.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 35
0 / 1 point
The market for consumer-grade tape backups has dwindled to a fraction of its former popularity in the last decade.
What are the primary drawbacks of tape backup?
Primary drawbacks of tape backup are the cost of specialized hardware to read tapes, cost involved in storing tapes
and reliability to restore from the tape.
This question has not been graded.
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
6/8
10/1/2014
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 36
0 / 1 point
Even the best backups are inadequate unless they can be used to successfully restore systems to an operational state.
What are some of the questions that must be answered by a backup and recovery plan?
Each backup and recovery setting should be provided with complete recovery plans, including testing and rehearsal.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 37
0 / 1 point
One strategy for implementing server recovery and redundancy through mirroring servers uses hot, warm, and cold
servers. Explain how this strategy works.
In this strategy, the online primary server is the hot server and it provides the services necessary to support
operations. The warm server serves as an secondary server and services request from primary when it is down or
busy. The cold server is the administrator's test platform and should be identically configured to the hot and warm
servers. This is used to test new patches and avoid hot server going down. Should the hot server go down, the warm
server takes over as hot server as the hot server is bought up.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 38
0 / 1 point
0 / 1 point
0 / 1 point
Database replication focuses on the backup of multiple copies of the database for recovery purposes. Briefly describe
three types of database replication.
The 3 types of db replication are :
1. Snapshot replication: Copying data from one database to another
2.Merger replication: Merging data from multiple databases into a separate database.
3. Transaction replication: Using a master db for regular operations but periodically copying new and updated entries
to a backup db.
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
7/8
10/1/2014
0 / 1 point
Using virtualization, an organization can take its existing hardware and deploy any other operating system and/or
application. There are several different levels of virtualization. Describe one of these: application-level virtualization.
This method virtualizes the OS layer so as to look to the application as the the expected OS, answering all necessary
application programming interface(API) call made by the application. The application perceives that it is interacting
with the host OS and the resources managed by it. This method is used to run application intended to run on nonnative OS.
This question has not been graded.
The correct answer is not displayed for Long Answer type questions.
View Feedback
Question 42
0 / 1 point
Attempt Score: 37 / 50 - 74
Overall Grade (highest attempt): 37 / 50 - 74
Close
https://durhamcollege.desire2learn.com/d2l/lms/quizzing/user/attempt/quiz_start_frame.d2l?ou=81490&isprv=&drc=0&qi=40830&cfql=False&dnb=0
8/8