Lab 9 Essay

613 Words Dec 8th, 2013 3 Pages
IS3110 – Risk Management
Lab # 9 – Develop recovery back-up procedures and recovery instructions

1. How does documented back-up and recovery procedures help achieve RTO? By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO.
2. True or False. To achieve an RTO of 0, you need 100% redundant, hot-stand-by infrastructure (i.e., IT system, application, and data, etc.). True
3. What is most important when considering data back-up? Registry, directories,
…show more content…
To know that and for those who proceed in that position, these test were completed and has been done before. A history will be formed and if ever a problem arises that has before, records will save time.
11. Why is it a best practice for an organization to document its back-up and recovery steps for DR? To know that and for those who proceed in that position, these test were completed and has been done before. A history will be formed and if ever a problem arises that has before, records will save time.
12. What can you do to cut down on the recovery time for accessing, copying, and recovering your Lab #1 – Lab #8 individual worksheets to help achieve the RTO? N/A
13. What will encryption of a disk or data in storage do to the RTO definition when attempting to retrieve and recover clear-text data for production use? Will take a bit more time to decrypt and retrieve the data before it can be used.
14. How many total steps did your back-up and recovery procedures consist of for this Lab exercise? Are there any that can be combined or streamlined? Not sure. But the fewer steps you have and easier the steps are, the less confusion and fewer mistakes will happen and that will save time on recovery, as well as a good recovery system.
15. If the individual accessing the system for DR purposes was not familiar with the IT system and required system administrator login credentials, what additional step is required

Related Documents