Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
27 Cards in this Set
- Front
- Back
__________ results from Business Impact Analysis activity. The ______ defines the threshold that if broken will result in severe damage to the organization.
|
Recovery Time Objectives (RTO)
|
|
Boundary Value Analysis is used to detect and remove errors occurring at parameter limits or boundaries. During what phase are these limits are checked to ensure proper application responses.
|
Implementation phase
|
|
First tasks of project initiation for BCP IN ORDER?
|
Appoint a project manager
Establish executive support Building a team Scoping the project Defining the objectives and deliverable. Preplan, estimate scope, gain management support, form implementation teams, obtain resource requirements. |
|
Most common source of security "disasters".
|
Most common source of security "disasters".
|
|
BCP phase II?
|
Current state assessments. Current state of ops, pen test, benchmarks, BIA.
|
|
BCP Phase III?
|
Design & dev phase. bases of baseline dev, action plans regarding next steps of recovery.
|
|
BCP phase IV?
|
Implementation phase. Work with process owners to develop a clear short term long term plan.
|
|
BCP phase V?
|
Day to day management of the continuity plan.
|
|
The pinnacle of time synchronized backups is mirroring, also called?
|
Electronic Vaulting
|
|
The DRP has the following 4 steps:
|
Recover the data center
Recover business operations Recover business location Recover business processes |
|
What are the deliverables of a BCP plan?
|
Risk analysis & impact
Disaster recovery steps Plan for testing Plan for training Procedure to keep the plan up-to-date |
|
Current state assessment phase
|
Include a statement of urgency
Include info on vital records Define an emergency response procedure Define emergency response guidelines |
|
BIA should cover what three things?
|
Business function priorities
Time-frame for recovery Resource requirements |
|
Vulnerability assessment has what characteristics?
|
It is smaller than a full risk assessment.
Identify critical business functions. Use results as input to recovery strategy. |
|
DRP should have list what three things?
|
Steps & Procedures
Lists primary and alternate team members Current call tree. Should also be well-written, easily accessible, and logically organized. |
|
Transmitting data in real-time or near real-time to back-up storage at a remote location.
|
Remote journaling
|
|
Similar to remote journaling
Provides additional rebust backup and storing duplicate data on multiple remote storage devices |
Database shadowing
|
|
Disk controller duplicated
If one controller fails, other controller operates. |
Disk duplexing
|
|
Implementation phase should have the following four items:
|
Have a clear Short term plan and long term plan.
List testing and training strategies Have enterprise crisis management plan. |
|
Plan Development: Supporting info contains what two things?
|
Introduction
Concept of operations |
|
Plan Development: Notification / Activation phase, list three items
|
Notification procedures
Damage assessment Plan activation |
|
Plan Development: Recovery Phase
list two items |
Sequence of recovery activities
Recovery procedures |
|
Plan Development: Reconstitution, list three items
|
Restore original site
Test systems terminate operations |
|
Plan Development: Appendices
lists 4 items |
POC
System requirements SOPs vital records |
|
In BCP, a consistency test is also referred to as what type of test?
|
Checklist test
|
|
in BCP, validity testing is also referred to as?
|
Structured walk-through test
|
|
In BCP, what happens during simulation testing?
|
Its a more through walk-through test than a validity test.
|