Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following tape formats can be used to backup data systems in addition to its original intended audio uses?

A.

Digital Video Tape (DVT).

B.

Digital Analog Tape (DAT).

C.

Digital Voice Tape (DVT).

D.

Digital Audio Tape (DAT).

Which of the following proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

A.

Direct evidence.

B.

Circumstantial evidence.

C.

Conclusive evidence.

D.

Corroborative evidence.

How should a risk be HANDLED when the cost of the countermeasure OUTWEIGHS the cost of the risk?

A.

Reject the risk

B.

Perform another risk analysis

C.

Accept the risk

D.

Reduce the risk

Which of the following computer recovery sites is the least expensive and the most difficult to test?

A.

non-mobile hot site

B.

mobile hot site

C.

warm site

D.

cold site

Valuable paper insurance coverage does not cover damage to which of the following?

A.

Inscribed, printed and Written documents

B.

Manuscripts

C.

Records

D.

Money and Securities

What assesses potential loss that could be caused by a disaster?

A.

The Business Assessment (BA)

B.

The Business Impact Analysis (BIA)

C.

The Risk Assessment (RA)

D.

The Business Continuity Plan (BCP)

Hierarchical Storage Management (HSM) is commonly employed in:

A.

very large data retrieval systems

B.

very small data retrieval systems

C.

shorter data retrieval systems

D.

most data retrieval systems

Which of the following is the most important consideration in locating an alternate computing facility during the development of a disaster recovery plan?

A.

It is unlikely to be affected by the same disaster.

B.

It is close enough to become operational quickly.

C.

It is close enough to serve its users.

D.

It is convenient to airports and hotels.

Which common backup method is the fastest on a daily basis?

A.

Full backup method

B.

Incremental backup method

C.

Fast backup method

D.

Differential backup method

Qualitative loss resulting from the business interruption does NOT usually include:

A.

Loss of revenue

B.

Loss of competitive advantage or market share

C.

Loss of public confidence and credibility

D.

Loss of market leadership

In which of the following phases of system development life cycle (SDLC) is contingency planning most important?

A.

Initiation

B.

Development/acquisition

C.

Implementation

D.

Operation/maintenance

Which of the following steps is NOT one of the eight detailed steps of a Business Impact Assessment (BIA):

A.

Notifying senior management of the start of the assessment.

B.

Creating data gathering techniques.

C.

Identifying critical business functions.

D.

Calculating the risk for each different business function.

Which of the following is covered under Crime Insurance Policy Coverage?

A.

Inscribed, printed and Written documents

B.

Manuscripts

C.

Accounts Receivable

D.

Money and Securities

Another example of Computer Incident Response Team (CIRT) activities is:

A.

Management of the netware logs, including collection, retention, review, and analysis of data

B.

Management of the network logs, including collection and analysis of data

C.

Management of the network logs, including review and analysis of data

D.

Management of the network logs, including collection, retention, review, and analysis of data

A prolonged high voltage is a:

A.

spike

B.

blackout

C.

surge

D.

fault

Which of the following is NOT a transaction redundancy implementation?

A.

on-site mirroring

B.

Electronic Vaulting

C.

Remote Journaling

D.

Database Shadowing

Prior to a live disaster test also called a Full Interruption test, which of the following is most important?

A.

Restore all files in preparation for the test.

B.

Document expected findings.

C.

Arrange physical security for the test site.

D.

Conduct of a successful Parallel Test

Which of the following is NOT a task normally performed by a Computer Incident Response Team (CIRT)?

A.

Develop an information security policy.

B.

Coordinate the distribution of information pertaining to the incident to the appropriate parties.

C.

Mitigate risk to the enterprise.

D.

Assemble teams to investigate the potential vulnerabilities.

Which of the following offers security to wireless communications?

A.

S-WAP

B.

WTLS

C.

WSP

D.

WDP

What is the name of the third party authority that vouches for the binding between the data items in a digital certificate?

A.

Registration authority

B.

Certification authority

C.

Issuing authority

D.

Vouching authority