Spread the love

1. How can you recover from an unexpected data loss event? Select all that apply.

  • Restore data from backups
  • Design a disaster recovery plan
  • Write a post-mortem report
  • Recover data from damaged devices

2. What is it best to store  backups, physically?

  • On-site
  • Across multiple locations
  • Off-site
  • In a safe

3. Which of these should be included in your organization’s backups? Select all that apply.

  • Sales databases
  • A downloads folder
  • Firewall configurations
  • Family vacation photos

4. What’s  magnetic tape backup media best suited for?

  • Low-latency cached data
  • Cheap backup systems
  • Quick and efficient backups
  • Long-term archival data

4. What’s  magnetic tape backup media best suited for?

  • Low-latency cached data
  • Cheap backup systems
  • Quick and efficient backups
  • Long-term archival data

5. Why is it important to test backups and restoration procedures? Select all that apply.

  • To prove the system is flawless and the IT team deserves a pay raise.
  • To ensure that relevant data is included in the backups
  • To reduce the size of backup data
  • To ensure backups work and data can be restored from them

6. Which of the following backup types are most space-efficient?

  • Full backups
  • Differential backups
  • Incremental backups

7. What elements should a disaster recovery plan cover? Select all that apply.

  • Drastic measures
  • Detection measures
  • Preventative measures
  • Recovery measures

8. Why are detection measures included in a disaster recovery plan?

  • Because it’s important to know when a disaster occurs
  • They aren’t
  • Because they prevent data loss
  • Because they make recovering from data loss easier

9. What are preventative measures?

  • Measures that are enacted after a disaster has occurred.
  • Measures that are meant to alert you and your team that a disaster has occurred that can impact operations.
  • Redundant systems
  • Measures that cover any procedures or systems in place that will proactively minimize the impact of a disaster.

10. What are good detection measures to incorporate in your organization? Select all that apply.

  • Redundant power supplies
  • Environmental monitoring
  • Backing up firewall rules
  • System performance monitoring

11. What are good recovery measures to incorporate in your organization? Select all that apply.

  • Restoring server configs from backup
  • Following detailed recovery plan documentation
  • Monitoring for internet line outages
  • Maintaining redundant servers

12. What’s the main purpose of writing a post-mortem?

  • To assign legal liability
  • To learn from mistakes and how to improve in the future
  • To assign blame for mistakes
  • To scare people into avoiding risky behavior

13. What should the timeline in a post-mortem include? Check all that apply.

  • A detailed analysis of the incident, including root cause and scope
  • Actions taken before, during, and after the event
  • Detailed dates and times
  • A summary of the incident and how long it lasted

14. What is one aspect of post-mortems that are often overlooked?

  • What went wrong
  • The summary
  • Timelines
  • What went well

15. What is the next step after writing a post-mortem report?

  • Share the report with other people on your team and/or other teams
  • Do not disclose the report to anyone
  • Destroy the report
  • Nothing, there are no additional steps after writing the report

16. What does the summary section of a post-mortem cover?

  • Description of the incident, how long it lasted, the impact of the incident, and how it was fixed.
  • list of specific actions that should be taken to avoid the same scenario from happening again.
  • Opening catchphrase and witty remarks to introduce the topic
  • Description of the incident

17. The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn’t go smoothly. You decide to investigate. What is a common term in the IT community for this investigation?

  • Recovery inspection probe
  • Post-mortem
  • After-outage analysis
  • Post-disaster inquiry

18. What are advantages of on-site backups? Select all that apply.

  • Data is more secure because of less outbound traffic
  • * D: There is less bandwidth usage
  • There is quicker data access
  • B: Data is safe in case of disaster

19. Which of these are common backup tools you might consider when designing a backup solution? Select all that apply.

  • Regedit
  • Backup and Restore
  • Time Machine
  • Rsync

20. What are good reasons to do yearly disaster recovery testing? Select all that apply.

  • To create downtime
  • To be prepared for all possible snags or problems
  • To ensure multiple people have appropriate rights and training to restore operations
  • To identify additional vulnerabilities

21. Which backup method saves copies of all important files and data at each backup?

  • RAID array
  • Differential backups
  • Complete backup
  • Incremental backup

22. Which of the following issues often make reliable backups for client devices more challenging than for infrastructure devices? Select all that apply.

  • There are likely to be more client devices to backup compared to infrastructure devices.
  • Data stored on client devices is more valuable than data stored on infrastructure devices.
  • Infrastructure backups do not require complicated scheduling or configuration.
  • Many client devices are mobile and won’t be in the office all the time.

23. Some steps of the disaster recovery plan might be time sensitive to ensure there is no data loss or equipment damage. Which element of the disaster recovery plan is designed to address this time sensitivity?

  • Detection measures
  • Disciplinary measures
  • Corrective or recovery measures
  • Preventative measures

24. You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of corrective or recovery measures? Select all that apply.

  • Hardware repair and replacement
  • Redundancy solutions
  • Restoring data from backup
  • Rebuilding and reconfiguring services

25. What are some benefits of a post-mortem? Select all that apply.

  • To learn from and adapt processes for higher efficiency
  • To understand the cause of mistakes and how to prevent them
  • To punish mistakes
  • To foster a culture where it’s OK to make mistakes

26. Which of the following are part of the five primary elements that make up a post-mortem report? Select all that apply.

  • An accounting of financial costs associated with preventative systems
  • A list of specific actions that should be taken to avoid the same scenario from happening again
  • *C: A description of root causes
  • D: Backup procedures

27. When designing a data backup and recovery plan, what’s the first thing to figure out?

  • Encryption and bandwidth requirements
  • How much total data you currently have
  • What data you need to backup
  • Future growth in data storage needs

28. A data backup strategy needs to prioritize important data and only back up what is necessary for operations. Assuming storage limitations, which of these is LEAST important to back up?

  • Emails
  • User downloads
  • Databases
  • Financial spreadsheets

29. What’s the optimal recommended backup storage strategy?

  • Off-site backups
  • On-site backups
  • A combination of on-site and off-site backups
  • Tape backups

30. Common concerns with backups are disk failure, lack of redundancy, and increasing disk capacity. Which backup method addresses these concerns?

  • Differential backups
  • Incremental backup
  • Complete backup
  • RAID array

31. Which type of backup only saves the parts of data that have changed within files since the last backup took place?

  • Differential backups
  • RAID array
  • Incremental backup
  • Complete backup

32. Which of the following are advantages of cloud storage services? Select all that apply.

  • Users can sync and backup files across platforms and devices.
  • They make it easy for users to configure what files or folders they want to backup.
  • They allow everyone to access a person’s files
  • User backups don’t require complicated scheduling.

33. You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of detection measures? Select all that apply.

  • Using an alert system for outages
  • Monitoring system testing
  • Testing knowledge and readiness for disaster
  • Conducting regular, automated backups

34. When are post-mortem reports usually created? Select all that apply.

  • To punish mistakes
  • When finance asks IT to justify the cost of its preventative systems
  • When something goes wrong
  • At the end of a project

35. Which of the following are components of a post-mortem report? Select all that apply.

  • A brief summary
  • An explanation of resolution and recovery efforts
  • All log data
  • A detailed timeline of key events

36. Which of the following is a critical part of data recovery?

  • Creating power redundancies
  • Effectively backing up data
  • Port forwarding
  • Stocking replacement drives

37. Which of the following are key parts of the disaster recovery testing process? Select all that apply.

  • Document restoration procedures
  • Replace old hardware
  • Run simulations of disaster events
  • Update all software

38. Which element of the disaster recovery plan is designed to proactively minimize the impact of a disaster?

  • Preventative measures
  • Disciplinary measures
  • Corrective or recovery measures
  • Detection measures

39. You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of preventative measures? Select all that apply.

  • Operational documentation
  • Regular, automated backups
  • Redundancy solutions
  • Alert system for outages

40. What are the goals of a disaster recovery plan? Select all that apply.

  • To prevent significant data loss
  • To predict disasters before they happen
  • To keep system downtimes to a minimum
  • To prevent disasters from impacting operations

41. What’s the purpose of a post-mortem report?

  • To learn from mistakes
  • To test systems
  • To assign legal liability
  • To identify bad employees

42. Which  backup type only backs up files that have changed since the last run?

  • Full backup
  • Partial backup
  • Incremental backup
  • Differential backup

43. Why is it important for post-incident analysis to highlight things that went well?

  • It helps demonstrate the effectiveness of systems in place.
  • It improves team morale.
  • It’s a way to get more money for preventative systems.
  • It minimizes the importance of what went wrong.

44. What are advantages of on-site  backups? Select all that apply.

  • There is less bandwidth usage
  • Data is more secure because of less outbound traffic
  • There is quicker data access
  • Data is safe in case of disaster

45. What is the standard medium for long-term archival backup data storage?

  • USB drives
  • Optical disks
  • Magnetic tapes
  • Floppy disks

46. Which of the following are popular cloud storage platforms? Select all that apply.

  • Dropbox
  • Rsync
  • Google Drive
  • Apple iCloud

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *