CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [231]
a. Onsite storage
b. Working copies
c. Incremental backup
d. Differential backup
3. Which system frequently has audit files/transaction logs that can be used for recovery?
a. Database system
b. Application server
c. Backup server
d. User system
4. You’re trying to rearrange your backup procedures to reduce the amount of time they take each evening. You want the backups to finish as quickly as possible during the week. Which backup system backs up only the files that have changed since the last backup?
a. Full backup
b. Incremental backup
c. Differential backup
d. Backup server
5. Which backup system backs up all the files that have changed since the last full backup?
a. Full backup
b. Incremental backup
c. Differential backup
d. Archival backup
6. You’re a consultant brought in to advise MTS on its backup procedures. One of the first problems you notice is that the company doesn’t utilize a good tape-rotation scheme. Which backup method uses a rotating schedule of backup media to ensure long-term information storage?
a. Grandfather, Father, Son method
b. Full Archival method
c. Backup Server method
d. Differential Backup method
7. Which site best provides limited capabilities for the restoration of services in a disaster?
a. Hot site
b. Warm site
c. Cold site
d. Backup site
8. You’re the head of information technology for MTS and have a brother in a similar position for ABC. Both companies are approximately the same size and are located several hundred miles apart. As a benefit to both companies, you want to implement an agreement that would allow either company to use resources at the other site should a disaster make a building unusable. What type of agreement between two organizations provides mutual use of their sites in the event of an emergency?
a. Backup-site agreement
b. Warm-site agreement
c. Hot-site agreement
d. Reciprocal agreement
9. The process of automatically switching from a malfunctioning system to another system is called what?
a. Fail safe
b. Redundancy
c. Fail-over
d. Hot site
10. You’ve been brought in as a temporary for FRS, Inc. The head of IT assigns you the task of evaluating all servers and their disks and making a list of any data not stored redundantly. Which disk technology isn’t fault tolerant?
a. RAID 0
b. RAID 1
c. RAID 3
d. RAID 5
11. Which agreement outlines performance requirements for a vendor?
a. MTBF
b. MTTR
c. SLA
d. BCP
12. Your company is about to invest heavily in an application written by a new startup. Because it is such a sizable investment, you express your concerns about the longevity of the new company and the risk this organization is taking. You propose that the new company agree to store its source code for use by customers in the event that it ceases business. What is this model called?
a. Code escrow
b. SLA
c. BCP
d. CA
13. Which policy describes how computer systems may be used within an organization?
a. Due care policy
b. Acceptable-use policy
c. Need-to-know policy
d. Privacy policy
14. You’re the administrator for STM and have been summoned to an unannounced audit. The auditor states that he is unable to find anything in writing regarding confidentiality of customer records. Which policy should you produce?
a. Separation-of-duties policy
b. Due care policy
c. Physical access policy
d. Document destruction policy
15. Which policy dictates how an organization manages certificates and certificate acceptance?
a. Certificate policy
b. Certificate access list
c. CA accreditation
d. CRL rule
16. You’re giving hypothetical examples during a required security training session when the subject of certificates comes up. A member of the audience wants to know how a party is verified as genuine. Which party in a transaction is responsible for