Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following terms refers to a data storage and processing facility that is virtualized and provided as a service?

A.

Cloud-based Storage

B.

Virtual Machines

C.

Software Defined Data Center

D.

Data Virtualization

Which of the following virtualization methods requires a software called containers or virtual engines to run?

A.

Data Virtualization

B.

Network Virtualization

C.

Desktop Virtualization

D.

OS-Based Virtualization

Max and Carl, two partners in an organization, are considering whether to implement a standard that provides a framework of methods and processes to identify and specify all aspects for improving an organization’s ICT readiness to ensure business continuity. Which standard are Max and Carl discussing?

A.

ISO 27031

B.

ISO 27005

C.

ISO 22313

D.

INCITS 483-2012

Zoe is a fashion designer who owns an online retail store. She was recently named ‘The Best Upcoming Fashion Designer of the Year’ by a highly popular fashion magazine. Due to this recognition, the web traffic to her site greatly increased. However, the server on which her website was housed could not handle the high amount of web traffic, which led to the crashing of the website. To resolve this issue, Zoe purchased two additional servers. Using a solution, she distributed the burden from the web traffic between the three servers, which helped in maximizing the efficiency of the servers. Which solution did Zoe use?

A.

Point in Time Recovery

B.

Load Balancing

C.

Clustering

D.

High-Availability

Owing to an impending cyclone, Jonas took certain measures to avoid or minimize the damage the cyclone could cause to his startup’s operations. Under which of the following classifications do Jonas’ measures fall?

A.

Prevention

B.

Backup

C.

Recovery

D.

Resumption

In which disaster recovery tier is data backed up with a hot site?

A.

Tier 1

B.

Tier 5

C.

Tier 2

D.

Tier 4

Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization. After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?

A.

Quantitative Risk Assessment

B.

Qualitative Risk Assessment

C.

Semi-Qualitative Risk Assessment

D.

Semi-Quantitative Risk Assessment

Which of the following training programs is meant for those employees who have an important role in the execution of the BCP and are provided with the framework, processes, and strategies involved in the plan?

A.

Detailed Awareness Training

B.

Simulation Training

C.

Scenario Training

D.

Introductory Awareness Training

Jack updated the operating system of his MacBook to the latest beta version. A few hours later, while working on his MacBook, Jack discovers that some of his installed applications are not working properly, and this may be due to the bug-ridden beta update. Hence, he decides to restore his MacBook to the previous OS version. Which MacBook feature should Jack be using in this scenario?

A.

Time Shift

B.

Image Recovery

C.

Snapshots

D.

Time Machine

Which of the following terms refers to the application of strategies designed to help an organization deal with a sudden and significant undesirable event?

A.

Risk Assessment

B.

Application Recovery

C.

Crisis Management

D.

Business Impact Analysis (BIA)