Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?
Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.
Which of the following sub-processes of IT Service Continuity Management is used to make sure that all members of IT staff with responsibilities for fighting disasters are aware of their exactduties?
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?
Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following plans provides procedures for disseminating status reports to personnel and the public?
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
Which of the following functions is performed by change control?
Which of the following is the simulation of the disaster recovery plans?
Which of the following maturity levels of the software CMM focuses on competent people and
heroics?
Which of the following Tier 1 policies will identify who is responsible for what?
Which of the following backup sites takes the longest recovery time?
Fill in the blank with the appropriate phrase.
____________ privilege escalation is the process of attempting to access sources with a higher access, such as a user account trying to access admin privileges.
Which of the following backup sites is a replica of the original site of an organization with full computer systems as well as near-complete backups of user data?
Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?
Fill in the blank:
An______(AS) is a group of networks under a single administration and with
single routing policies.
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
Which of the following phases is the first step towards creating a business continuity plan?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?
Which of the following processes identifies the threats that can impact the business continuity of operations?
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following defines the communication link between a Web server and Web applications?
Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?
In which of the following prototyping, a prototype of a system is built and then evolves into the final system?
Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?
Which of the following processes helps the business units to understand the impact of a disruptive event?
Which of the following security procedures is related to the SDLC's implementation?
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
Which of the following SSE-CMM security engineering Process Areas (PA) provides the security input?
Which of the following parts of BS 7799 covers risk analysis and management?
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
Each correct answer represents a part of the solution. Choose all that apply.
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
Which of the following authorizes and documents all the changes in the IT Infrastructure and its components (Configuration Items) in order to maintain a minimum amount of interruptive effects upon the running operation?
Which of the following documents is necessary to continue the business in the event of disaster or emergency?