1.
Natural disaster such as earthquakes can usually be mitigated with multipurpose casualty insurance.
2.
The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
3.
In disaster recovery, most triggers are in response to one or more natural events.
4.
When selecting an off-site storage location for data backups or stored equipment, extra care should be taken to increase the risk at that storage location.
5.
A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
6.
____ are those that occur suddenly, with little warning, taking the lives of people and destroying the means of production.
A. 
B. 
C. 
D. 
7.
____ may be caused by earthquakes, floods, storm winds, tornadoes, or mud flows.
A. 
B. 
C. 
D. 
8.
____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.
A. 
B. 
C. 
D. 
9.
The ___ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.
A. 
B. 
C. 
D. 
10.
In disaster recovery, the ___ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.
A. 
B. 
C. 
D. 
11.
Once the incident has been contained, and all signs of the incident removed, the ___ phase begins.
A. 
B. 
C. 
D. 
12.
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.
A. 
B. 
C. 
D. 
13.
____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific details to his or her associates the method and results of their latest conquest.
A. 
B. 
C. 
D. 
14.
____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.
A. 
B. 
C. 
D. 
15.
Before returning to routine duties, the IR team must also conduct a(n)_____.
A. 
B. 
C. 
D. 
16.
_____ consideration for desktop and portable system should emphasize data availability, confidentiality, and integrity.
A. 
B. 
C. 
D. 
17.
Data from the ____ of major applications and general support systems should be used to determine the recovery requirement and priorities to implement.
A. 
B. 
C. 
D. 
18.
Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.
A. 
B. 
C. 
D. 
19.
_____ support file sharing and storage, data processing, central application hosting (such as e-mail or a central database), printing, access control, user authentication, remote access connectivity, and other shared network services.
A. 
B. 
C. 
D. 
20.
A _____ is owned by a single organization; it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.
A. 
B. 
C. 
D. 
21.
When developing the LAN contingency plan, the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.
A. 
B. 
C. 
D. 
22.
____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.
A. 
B. 
C. 
D. 
23.
_____ systems are implemented in environment in which clients and users are widely dispersed.
A. 
B. 
C. 
D. 
24.
____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.
A. 
B. 
C. 
D. 
25.
____ system components are critical to ensure that a failure of a system component, such as a power supply, does not cause a system failure.
A. 
B. 
C. 
D.