Natural Disaster Chapter 7

31 Questions | Total Attempts: 189

SettingsSettingsSettings
Please wait...
Natural Disaster Quizzes & Trivia

A disaster is defined as a natural catastrophe that causes great damage or loss of life. The quiz below is set to test on among other things mitigating these disasters, as they cannot be prevented. All the best.


Questions and Answers
  • 1. 
    Natural disaster such as earthquakes can usually be mitigated with multipurpose casualty insurance.
    • A. 

      True

    • B. 

      False

  • 2. 
    The purpose of the disaster recovery program is to provide for the direction and guidance of any and all disaster recovery operations.
    • A. 

      True

    • B. 

      False

  • 3. 
    In disaster recovery, most triggers are in response to one or more natural events.
    • A. 

      True

    • B. 

      False

  • 4. 
    When selecting an off-site storage location for data backups or stored equipment, extra care should be taken to increase the risk at that storage location.
    • A. 

      True

    • B. 

      False

  • 5. 
    A WAN that hosts a mission-critical distributed system may require a more complete and robust recovery strategy than a WAN that connects multiple LANs for simple resource sharing purposes.
    • A. 

      True

    • B. 

      False

  • 6. 
    ____ are those that occur suddenly, with little warning, taking the lives of people and destroying the means of production.
    • A. 

      Slow onset disaster

    • B. 

      Communication disaster

    • C. 

      Rapid onset disaster

    • D. 

      Data disaster

  • 7. 
    ____ may be caused by earthquakes, floods, storm winds, tornadoes, or mud flows.
    • A. 

      Slow onset disaster

    • B. 

      Communication disaster

    • C. 

      Rapid onset disaster

    • D. 

      Data disaster

  • 8. 
    ____ occur over time and slowly deteriorate the capacity of an organization to withstand their effects.
    • A. 

      Slow onset disaster

    • B. 

      Communication disaster

    • C. 

      Rapid onset disaster

    • D. 

      Data disaster

  • 9. 
    The ___ should contain the specific and detailed guidance and procedures for restoring lost or damaged capability.
    • A. 

      Forensic report

    • B. 

      DR planning document

    • C. 

      Event schedule

    • D. 

      Contingency report

  • 10. 
    In disaster recovery, the ___ is the point at which a management decision to react is made in reaction to a notice or other data such as a weather report or an activity report from IT indicating the escalation of an incident.
    • A. 

      Mirrored site

    • B. 

      Hot site

    • C. 

      Cold site

    • D. 

      Trigger

  • 11. 
    Once the incident has been contained, and all signs of the incident removed, the ___ phase begins.
    • A. 

      Action after

    • B. 

      Black bag operation

    • C. 

      Chain of custody

    • D. 

      Blue bag operation

  • 12. 
    ____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.
    • A. 

      Follow-on incidents

    • B. 

      War games

    • C. 

      Black bag operations

    • D. 

      Blue bag operations

  • 13. 
    ____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific details to his or her associates the method and results of their latest conquest.
    • A. 

      Follow-on incidents

    • B. 

      War games

    • C. 

      Black bag operations

    • D. 

      Blue bag operations

  • 14. 
    ____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired.
    • A. 

      After-action review

    • B. 

      Hashing

    • C. 

      Forensics analysis

    • D. 

      Clustering

  • 15. 
    Before returning to routine duties, the IR team must also conduct a(n)_____.
    • A. 

      Chain of custody

    • B. 

      After-action review

    • C. 

      War games

    • D. 

      Alarm compaction

  • 16. 
    _____ consideration for desktop and portable system should emphasize data availability, confidentiality, and integrity.
    • A. 

      Forensic

    • B. 

      Contingency

    • C. 

      Hashing

    • D. 

      Black bag

  • 17. 
    Data from the ____ of major applications and general support systems should be used to determine the recovery requirement and priorities to implement.
    • A. 

      Alert log

    • B. 

      Signature log

    • C. 

      BIA

    • D. 

      System log

  • 18. 
    Web site ____ solutions should ensure the reliability and availability of the Web site and its resources.
    • A. 

      Security

    • B. 

      Contingency

    • C. 

      Maintenance

    • D. 

      Cache

  • 19. 
    _____ support file sharing and storage, data processing, central application hosting (such as e-mail or a central database), printing, access control, user authentication, remote access connectivity, and other shared network services.
    • A. 

      Servers

    • B. 

      Honeypots

    • C. 

      Filters

    • D. 

      Clusters

  • 20. 
    A _____ is owned by a single organization; it can be as small as two PCs attached to a single hub or it may support hundreds of users and multiple servers.
    • A. 

      Honeypot

    • B. 

      Cache

    • C. 

      Filter

    • D. 

      LAN

  • 21. 
    When developing the LAN contingency plan, the contingency planning coordinator should identify ____ that affect critical systems or processes outlined in the BIA.
    • A. 

      Events

    • B. 

      Filters

    • C. 

      Single points of failure

    • D. 

      Servers

  • 22. 
    ____ contingency considerations should enhance the ability of recovery personnel to restore WAN services after a disruption.
    • A. 

      Cache

    • B. 

      Server

    • C. 

      Web site

    • D. 

      WAN

  • 23. 
    _____ systems are implemented in environment in which clients and users are widely dispersed.
    • A. 

      Security

    • B. 

      DNS systems

    • C. 

      Redundant

    • D. 

      Distributed

  • 24. 
    ____ strategies should emphasize the mainframe's data storage capabilities and underlying architecture.
    • A. 

      BIA

    • B. 

      Coningency

    • C. 

      Maintenance

    • D. 

      Redundant

  • 25. 
    ____ system components are critical to ensure that a failure of a system component, such as a power supply, does not cause a system failure.
    • A. 

      Redundant

    • B. 

      Contingency

    • C. 

      BIA

    • D. 

      Redundant

Related Topics
Back to Top Back to top