Sam was working on an Ubuntu OS-based system and accidentally deleted some of his official project files. Fortunately, he had taken a backup of his system previously. Which of the following native Ubuntu options should he use to recover his deleted files?
Which of the following terms refers to a client-server architecture that is merged with layered architecture?
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.
James owns a company that provides 24x7 telephonic technical support for a technology giant. During a risk assessment, he discovered that should a natural disaster strike rendering his facility defunct, he would need at least a hundred telephone lines up and running within eight hours to keep his business running. He contacted a service provider that assured him that a hundred virtual connections can be provided to him in such a case within the time frame. For such a service, James would have to shell out $10,000 a day. James has a cold backup site that takes 48 hours to become functional. To make it a warm or a hot site, James would have to incur a cost way more than the virtual service. Hence, James kept the cold site and kept aside $20,000 from the company funds for the virtual service should this scenario occur. What is this emergency fund that James kept aside called?
XYZ.com is a popular online discounts store based out of London. Due to a disaster, one of the hosting servers was destroyed, slowing the website considerably. The management feared that this would lead to a decrease in the website traffic. Fortunately, the network administrators at the organization solved the problem of the slow running of the website by routing the site traffic to the alternate hosting server based in Mumbai. What technical term best describes this scenario?
Phoebe was conducting several test cases in her organization for the disaster recovery plan. For the cases to be successful, at least 90% of the test cases must pass. What is this scenario known as?
The internal audit of the BCP takes place so as to make sure the plan conforms to which particular standard?
Rachel was reviewing the various tiers of disaster recovery so as to implement them in her startup. One particular tier attracted her attention, and she wanted to put it into effect in her startup. This specific disaster recovery tier backed up data over a WAN connection. Which disaster recovery tier did Rachel want to implement in her startup?
When information confidentiality increases in PASIS architecture, what else also increases as a direct result?
Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _________ in order to set up.
Which of the following terms refers to the evaluation of the potential interruptions in the working of a department due to the failure of their internal systems?
Jessie was implementing PASIS architecture in her organization in order to keep the organization’s critical data safe, in case a disaster struck. Additionally, she also wanted to prevent unauthorized access of data. After the PASIS architecture was implemented, the critical data was only accessible to the authorized employees. Which feature of PASIS architecture made this possible?
Zane is a server administrator. While doing the regular maintenance of the servers, she finds out that the Active Directory of one of the servers present in the domain is missing. Which restoration process would help Zane in this scenario given that all the other servers in the domain have their Active Directory intact?
Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:
It has a parity check to store all the information about the data in multiple drives.
Help reconstruct the data during downtime.
Process the data at a good speed.
Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?
Roger was testing the BCP in his organization. The test that he was conducting simulated a specific event scenario, in which the BCP would be tested. Which test was Roger making use of?
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?
Which of the following teams is responsible for the implementation and execution of the disaster recovery plan, including test plans?
James was working on a presentation for the past few weeks. Once James completed the presentation, he stored it on an external hard disk. Unfortunately, James accidentally damaged the hard drive when he was on his way for the presentation. Due to the irreversible damage, the data present on the hard drive was rendered unreadable and inaccessible. What type of data loss did James cause?
Which of the following terms refers to the act, manner, or practice of an organization to bring systems, applications, and data back to "normal" conditions in a prescribed and acceptable time frame?
Which of the following clusters uses mounted file systems to read and write data?
Archie was testing the BCP in his startup by mobilizing the resources. Which specific test was Archie conducting?
Joanna installed a software on her office computer that backed up, restored, and recovered database files. The software performed these functions using database server sessions. Which software did Joanna install?
Mia’s office computer was destroyed completely in a fire that burnt down her apartment. The laptop was crucial for her to carry on with her responsibilities at work since it had a lot of important data about her clients and her dealings with them. As a policy, the IT department had taken frequent backups of her laptop for such situations. The IT department took a laptop in which no OS or software was installed and which was identical to her old one. They used the backups of her old laptop to restore the new one to a last known state of the old one. The entire process was automated, so it was done quickly with a little margin of error. Which method of data recovery did the IT team employ?
Which of the following is NOT an advantage of colocation facilities?
Using which feature of Windows 10 can users preserve the state of the systems including the important system files, installed applications, and system settings?
Max and Carl, two partners in an organization, are considering whether to implement a standard that provides a framework of methods and processes to identify and specify all aspects for improving an organization’s ICT readiness to ensure business continuity. Which standard are Max and Carl discussing?
Which of the following disaster recovery tiers makes use of point-in-time copies?
ABC Inc. has a host of servers, each serving a different purpose. Almost all of them are critical to the functioning of the business. Most of the servers were virtualized and had backup virtual components. Thus, when the memory of one server crashed in the middle of a busy business day, it did not affect the operations as the server quickly switched to a different virtual memory, which was kept as a backup for this purpose precisely. What is such a feature called?
To protect against a disaster or other site-specific problem, many people choose this method to back up their media. The location can be as simple as the system administrator’s home office or as sophisticated as a disaster-hardened, temperature-controlled, high-security bunker that has facilities for backup media storage. Which type of backup method is being referred to here?
Jonathan was tasked with conducting the risk assessment process for a logistics-based startup. As part of his assignment, he was required to spend time in the organization and interact with people so as to prioritize the various risks faced by the organization. After examining the risks faced by the organization, he classified the risks in the following order:
Very High
High
Medium
Low
Very LowWhich assessment method did Jonathan use to perform the risk assessment?
Which of the following terms refers to the system’s ability to correctly serve the requests that it receives?
Jake was preparing a particular plan for his organization in which all personnel accountable for research, development, and implementation of the disaster recovery plan were being identified. Which plan was Jake preparing for his organization?
Which disaster recovery plan is very expensive and disrupts normal business operations?
Jack owns a startup that provides IT solutions to customers. Jack’s business was faring very well; however, he was facing issues with the scalability of his IT infrastructure. He decided to remedy this situation by implementing a solution, which connected his computers and servers into a single unified computing resource. He connected these computers and servers using various hardware, networks, and software. Additionally, implementation of this solution helped him protect his business against application, server, software, and site failures. Which solution did Jack implement?
Which of the following terms refers to the delay experienced by a system while it is serving a request?
Which of the following technical processes provides additional security to virtual machines by disabling unnecessary interfaces, devices, ports, and services?
Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily’s company?
XYZ Inc. is an esteemed organization that deals with a variety of internet services and solutions. The organization is developing an Internet-based messaging application, which is currently in the analysis phase. According to the analysis conducted, if a disaster destroyed the primary server, the secondary server would only be able to take the traffic load for four hours since it had limited memory and storage capabilities. Hence, the primary server would need to be up and running within four hours. What technical term best defines this time period of four hours?
Which of the following terms refers to the process of repairing the old site affected by a disaster or setting up a completely new alternate site to resume business operations after a disaster?
Which of the following terms refers to a set of tasks that organizations must continue throughout or resume rapidly after a disruptive incident?
After learning about the features of PASIS architecture, James decides to implement the same in his startup. After a few months, an earthquake destroyed a few storage nodes in the central server rendering the data in those nodes unreadable. Since James had implemented the PASIS architecture, he was able to recover the data present in the destroyed nodes. Which feature of PASIS architecture allowed James to recover the data?
Jill wanted to start a food truck with her savings from her previous job. Before she did so, she wanted to make sure that it would prove to be a feasible investment. After discussing her plans with a few industry professionals, she was advised to conduct an analysis to help her decide if the business would prove to be profitable in the monetary sense. Which analysis was Jill advised to conduct?
Which of the following options must be considered by an organization when conducting BIA?
Which of the following terms refers to the process of an organization to bring a system’s application, and data back to a previous state in a prescribed and acceptable time frame?