BCP and DR Initiative

UnabashedTangent329 avatar
UnabashedTangent329
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is the FIRST step taken by the security team in the initiative?

Have each business unit conduct a BIA and categorize applications

What is the primary goal of the security team's initiative?

To determine the order of applications to be brought back online

What is the purpose of a Business Impact Analysis (BIA)?

To determine the operational importance of each application

Why is it important to determine the operational importance of each application?

To determine the order in which applications must be brought back online

What is the geographical scope of the social media application?

Multi-geographic locations around the world

Where is the organization's headquarters and only datacenter located?

New York City

What was the primary issue that the e-commerce company's web server faced during the last two holiday seasons?

Performance issues due to too many connections

What is the most cost-effective solution to address the e-commerce company's web server performance issues?

Move the server to a cloud provider

What is the primary security objective when applying cryptography to control messages in an ICS?

Assuring the integrity of messages

What is the estimated time required to restore the human resources fileshare after a ransomware attack?

4 hours

How often did the human resources fileshare get backed up?

Every 48 hours

What was the impact of the ransomware attack on the human resources fileshare?

The entire fileshare was encrypted

What is the primary requirement for web servers in the given corporate firewall architecture?

Receive updates via HTTP/S from the corporate network

What is the purpose of Firewall_A in the given architecture?

Route traffic from the corporate network to web servers

What is the purpose of the rule 'Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443'?

Allow incoming HTTP/S traffic from the corporate network

What is the primary goal of the developer in maintaining integrity to each module of a program?

Ensure the code cannot be altered by malicious users

What is the purpose of Firewall_B in the given architecture?

Route traffic from web servers to the corporate network

What is the primary requirement for employees' computing devices in the given corporate firewall architecture?

Connect to web services over ports 80 and 443

What is the recommended action based on the RPO requirement of 24 hours?

Increase the frequency of backups and create SIEM alerts for IOCs

What is the first step the security analyst should take upon observing suspicious network traffic?

Investigate web logs to determine if the traffic is normal

What is the primary concern of the security analyst regarding the malicious piece of code on the Linux system?

The code is performing a lot of input/output (I/O) on the disk drive

What should the management team prioritize based on the RPO requirement?

Increasing the frequency of backups

What is the most likely reason for the security analyst to investigate the web logs?

To identify potential security threats

What should the security analyst do next after identifying the process ID of the malicious code?

Access the host via EDR and identify processes with network connections

Who is ultimately responsible for a breach in a cloud-hosted application with a managed database?

The pharmaceutical company

What is the primary risk associated with failed API calls in an e-commerce site?

Damage to the company's reputation

What is the purpose of a self-healing system?

To address system unavailability

What is the primary purpose of the secure storage room?

To restrict access to authorized personnel

What is the purpose of the cameras positioned on both sides of the door?

To identify any unauthorized individuals

What is the purpose of the card reader issued by the security team?

To restrict access to authorized personnel

The security team is undertaking an initiative to gather data on the operational importance of business applications and determine the order of recovery in the event of a disaster. What is the first step in this process? Read on to find out.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser