Mainframes are perceived as being more robust

Assignment Help Basic Computer Science
Reference no: EM13714421

QUESTION 1
Mainframes are perceived as being more robust than n-tier server architectures.
True
False
QUESTION 2
The key role of a DR plan is defining how to reestablish operations at the location where the organization is usually located.
True
False
QUESTION 3
When the primary site has been restored to working order, all business functions must return at the same time.
True
False
QUESTION 4
A(n) is a detailed examination of the events that occurred, from first detection to final recovery.

QUESTION 5
Blended attacks can occur via any type of Internet or network service, such as e-mail, Web servers or clients, and Windows shares.
True
False
QUESTION 6
occur over time and slowly deteriorate the organization's capacity to withstand their effects.
QUESTION 7
A(n) must support the immediate reestablishment of operations at an alternate site and eventual reestablishment of operations back at the primary site.
QUESTION 8
occurs when management had a responsibility to do something, in line with due diligence or due care, but did not do anything or did the wrong things.
QUESTION 9
A(n) is the list of officials, ranging from an individual's immediate supervisor to the top executive of the organization.



QUESTION 10
The term refers to the process of accounting for all personnel - that is, determining each individual's whereabouts - during an emergency.
QUESTION 11
is the use of forensics techniques when the source of evidence is a computer system.
QUESTION 12
Network IDPSs cannot detect all incidents, especially those attacks that are not network-based.
True
False
QUESTION 13
A(n) is a scripted description of the disaster and consists of just enough information so that each responder knows what portion of the DR plan to implement without impeding the notification process.
QUESTION 14
represents the final response of the organization when faced with any interruption of its critical operations.
QUESTION 15
The phase involves activating the DR plan and following the steps outlined therein.
QUESTION 16
A(n) is a collection of nodes in which the segments are geographically dispersed.
QUESTION 17
are those that occur suddenly, with little warning, taking the lives of people and destroying the means of production.
QUESTION 18
The is the amount of time that the business can tolerate until the alternate capabilities are available.
QUESTION 19
A(n) is an information system with a telephony interface that can be used to automate the alert process.
QUESTION 20
The term is used to describe the group responsible for the process of initiating the occupation of the alternate facility.
QUESTION 21
A(n) is a significant business disruption with a direct impact on the lives, health, and welfare of an organization and its employees.
QUESTION 22
The term means making an organization ready for possible contingencies that can escalate to become disasters.
QUESTION 23
is the movement of employees among positions at the same organizational level rather than through progression and promotion.
QUESTION 24
The SP must include its own mission statement or statement of purpose as well as be a uniquely customized approach for the needs of the specific organization for which it is developed.
True
False
QUESTION 25
The initial determination of the scope of the breach of confidentiality, integrity, and availability of information and information assets is called the .
QUESTION 26
is simply a human response that is part of dealing with the inexplicable travesty associated with loss - loss of life, limb, or property.
QUESTION 27
is the legal component of civil law whereby one party can obtain evidence from the opposing party through specific requests for information.




QUESTION 28
The BC plan should identify how staffing operations will function and who is responsible for overseeing and implementing them.
True
False
QUESTION 29
is the use of methodical technical investigation and analysis techniques to identify, collect, preserve, and analyze objects and information of potential evidentiary value so that it may be admitted as evidence in a court of law, used to support administrative action, or simply used to further analyze suspicious events.
QUESTION 30
involves an attempt made by those who may become subject to digital forensic techniques to obfuscate or hide items of evidentiary value.
QUESTION 31
The term is used is in the military and government sectors to represent the process of moving out of temporary facilities and returning them back to the owners or managers.




QUESTION 32
Mitigation of impact is the inclusion of action steps to minimize the damage associated with the disaster on the operations of the organization.
True
False
QUESTION 33
is the preparation for and recovery from a disaster, whether natural or man-made.

QUESTION 34
is the process of preparing for, responding to, recovering from, and managing communications during a crisis.
QUESTION 35
During the phase, the organization begins the recovery of the most time-critical business functions - those necessary to reestablish business operations and prevent further economic and image loss to the organization.
QUESTION 36
is the process that enables an organization to cope with any loss of personnel with a minimum degree of disruption to the functionality of the organization, by predefining the promotion of internal personnel usually by position.


QUESTION 37
The primary goal of the phase is to repair all damage to the primary site or select or build a replacement facility.
QUESTION 38
is information, graphics, images, or any other physical or electronic item that could have value as evidence in a legal proceeding, whether criminal or civil.
QUESTION 39
The mainframe is a large, multi-user system designed to provide both computational capacity and high-volume data storage support for large organizations.
True
False
QUESTION 40
is defined as the search for, collection, and review of items stored in electronic (or, more precisely, digital) format that are of potential evidentiary value based on criteria specified by a legal team.
QUESTION 41
The is simply a legal record of where the evidence was at each point in its lifetime and documentation of each and every access to it.


QUESTION 42
is the rapid relocation of an organization's critical business functions to an alternate location until such time as the organization is able to return to the primary site or relocate to a new permanent facility.
QUESTION 43
The maintenance of the IR plan is a trivial commitment for an organization.
True
False
QUESTION 44
is the determination of the initial flaw or vulnerability that allowed the incident to occur; it is done by examining the systems, networks, and procedures that were involved.
QUESTION 45
when an individual, an application, or another program, through access to the operating system's application programming interface (API), attempts to and/or gains access to an information asset without explicit permission or authorization to do so.
QUESTION 46
is functionally similar to job rotation but only involves the rotation of a portion of a job.


QUESTION 47
The goal of the is to initiate implementation of secondary functions.
QUESTION 48
is a category of incidents that covers a spectrum of violations made by authorized users of a system who nevertheless use the system in ways specifically prohibited by management.
QUESTION 49
are those individuals who are hired above and beyond the minimum number of personnel needed to perform a business function
QUESTION 50
is the movement of employees from one position to another so they can develop additional skills and abilities.

Reference no: EM13714421

Questions Cloud

Use a common data center of twenty : Analyze and explain how you would use DNS in your plan. Compose a two-paragraph executive summary highlighting the main points of your plan. Use at least three (3) quality resources in this assignment.
Implement unsigned 8-bit multiplication and division algorit : Implement unsigned 8-bit multiplication and division algorithms in MIPS assembly language. You need to follow the multiply and divide algorithms as given in the textbook or the slides. You must NOT use any MIPS multiplication or division instru..
Explain how the maxflow algorithm works : Explain how the maxflow algorithm works, elaborating on all cases and transitions that need to be considered during execution.
Identify the java-based technologies utilized : Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.
Mainframes are perceived as being more robust : QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False
Compare and contrast physical access controls : Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Exploited both network and host vulnerabilities : Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..
The term means making an organization ready : QUESTION 1 The term means making an organization ready for possible contingencies that can escalate to become disasters.QUESTION 2 Mainframes are perceived as being more robust than n-tier server architectures.
Analysis summarizing the wireless design : Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write name of storage location involved in the code

Recognize each dependency by type; write the two instructions involved; recognize which instruction is dependent; and name storage location involved.

  Design and implement a class that allows a teacher to track

Design and implement a class that allows a teacher to track the grades in a single course. Include methods that calculate the average grade, the highest grade, and the lowest grade. I use C# and visual studio 2012

  Creating report by city and by product to record sales

Create a report by city and another by product, including details of the sales and sub-totals and totals for quantity.

  Would an arraylist be better suited for your use

Would an ArrayList be better suited for your use

  Declares several circle objects

Declares several Circle objects

  What type of malware attack is this

What type of malware attack is this and what vulnerability is she trying to exploit in order to get her malware code past the network firewalls of these companies?

  Analyse the effectiveness of the qantas

Analyse the effectiveness of the Qantas Online Air Ticketing system

  Write a function called dicegame that takes in a vector

Write a function called diceGame that takes in a vector representing the dice values and returns the amount of money won.

  Describe the available materials and services

Describe the available materials and services

  What will be the date in the opening of the letter

If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter?

  What types of threats does the tool mitigate

What types of threats does the tool mitigate?

  Write a program that will define the f string manipulation

1.) Write a program that will define the following string manipulation functions. Each is analogous to thecorresponding C++ string function.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd