Disaster recovery plan regular reviews of recovery plan

Assignment Help Basic Computer Science
Reference no: EM132849725

1. Your organization is implementing a new file server. You have been asked to implement a disk subsystem that is a failure-resistant disk system (FRDS). Which criterion should this system meet?

A. It protects against data loss due to disk drive failure.

B. It protects against data loss due to external power failure.

C. It protects against loss of access to data due to power supply failure.

2. What is the term for RAID 1 implemented with a single hard disk controller?

A. Disk duplexing

B. Disk mirroring

C. Disk striping

3. Your company has a backup solution that performs a full backup each Saturday evening and an incremental backup all other evenings. A vital system crashes on Monday morning. How many backups will need to be restored?

A. One

B. Two

C. Three

4. Your organization implements a full/differential backup scheme. A full backup was completed two days ago. Yesterday, a differential backup was completed. Which files were backed up yesterday?

A. All files in a backup set

B. All files in a backup set that were changed or created since the last full backup

C. All files in a backup set that were changed or created since the last differential backup

5. Which electronic backup solution backs up data in real time but transmits the data to an offsite facility in batches?

A. Remote journaling

B. Hierarchical storage management (HSM)

C. Electronic vaulting

6. Your organization is researching alternate computing facilities to ensure that the organization is able to function if the primary facility is destroyed. Which offsite facility is the most expensive to implement?

A. Hot site

B. Warm site

C. Cold site

7. During a recent natural disaster, the primary location for your organization was destroyed. To bring the alternate site online, you restored the most critical systems first. Now a new primary site is complete, and you need to ensure that the site is brought online in an orderly fashion. What should you do first?

A. Restore the most critical functions to the new primary site.

B. Restore the least critical functions to the new primary site.

C. Restore all independent functions to the new primary site.

8. Which site is usually maintained within the company and requires no contract with an offsite vendor?

A. Redundant site

B. Hot site

C. Warm site

9.Which of the following is the MOST important element that an incident handler should possess?
A. Integrity

B. Ability to cope with stress

C. Presentation skills

10. Which of the following is MOST important when deciding whether to build an alternate facility or to acquire a hot site operated by a third party?
A. Cost to rebuild information-processing facilities

B. Estimated annual loss expectancy

C. Location and cost of commercial recovery facilities

11. Which of the following documents should be contained in a computer incident response team manual?
A. Severity criteria

B. Employee phone directory

C. Table of all backup files

12. Which of the following practices would best ensure the adequacy of a disaster recovery plan regular reviews of recovery plan information?

A. Regular audits of disaster recovery facilities

B. Regular reviews of recovery plan information

C. Regular recovery exercises regular

Reference no: EM132849725

Questions Cloud

Compute the total variable cost per unit : Tempo Company's fixed budget (based on sales of 16,000 units) for the first quarter reveals the following. Compute the total variable cost per unit
Windows Active Directory Network : How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup.
How does career field intersect with sustainability : How does your career field intersect with sustainability? Are there improvements that could be made in the areas of sustainability in chosen university?
Intrusion detection system : Which intrusion detection system (IDS) uses a magnetic field to detect intrusions? Which technologies are considered remote-sensing technologies?
Disaster recovery plan regular reviews of recovery plan : Which of the following practices would best ensure the adequacy of a disaster recovery plan regular reviews of recovery plan information?
What are trying to capture when creating gesture drawings : What are you trying to capture when creating gesture drawings? How can you envision these assisting in your overall figure drawing skills?
Discuss why found evidence more persuasive : Discuss why you found this evidence more persuasive. Does it match your personal experience? Do you just believe him because of the way he describes it?
Conduct a sensitivity analysis of the project NPV : Suppose the cash flows are prepetuities and the cost of capital is 10%. Conduct a sensitivity analysis of the project's NPV to variations in revenues
What should musicians health education sound like : What statistical test do use when analysing data from the social physique anxiety scale? What should musicians' health education sound like?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd