BCP and DR Initiative
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the FIRST step taken by the security team in the initiative?

  • Implement replication of all servers and application data to back-to-back up datacenters
  • Have each business unit conduct a BIA and categorize applications (correct)
  • Perform a review of all policies and procedures related to BCP and DR
  • Create an SLA for each application with business units
  • What is the primary goal of the security team's initiative?

  • To develop an educational module on BCP/DR events
  • To create an SLA for each application with business units
  • To determine the order of applications to be brought back online (correct)
  • To implement replication of all servers and application data
  • What is the purpose of a Business Impact Analysis (BIA)?

  • To develop an SLA for each application with business units
  • To determine the operational importance of each application (correct)
  • To create an educational module on BCP/DR events
  • To implement replication of all servers and application data
  • Why is it important to determine the operational importance of each application?

    <p>To determine the order in which applications must be brought back online</p> Signup and view all the answers

    What is the geographical scope of the social media application?

    <p>Multi-geographic locations around the world</p> Signup and view all the answers

    Where is the organization's headquarters and only datacenter located?

    <p>New York City</p> Signup and view all the answers

    What was the primary issue that the e-commerce company's web server faced during the last two holiday seasons?

    <p>Performance issues due to too many connections</p> Signup and view all the answers

    What is the most cost-effective solution to address the e-commerce company's web server performance issues?

    <p>Move the server to a cloud provider</p> Signup and view all the answers

    What is the primary security objective when applying cryptography to control messages in an ICS?

    <p>Assuring the integrity of messages</p> Signup and view all the answers

    What is the estimated time required to restore the human resources fileshare after a ransomware attack?

    <p>4 hours</p> Signup and view all the answers

    How often did the human resources fileshare get backed up?

    <p>Every 48 hours</p> Signup and view all the answers

    What was the impact of the ransomware attack on the human resources fileshare?

    <p>The entire fileshare was encrypted</p> Signup and view all the answers

    What is the primary requirement for web servers in the given corporate firewall architecture?

    <p>Receive updates via HTTP/S from the corporate network</p> Signup and view all the answers

    What is the purpose of Firewall_A in the given architecture?

    <p>Route traffic from the corporate network to web servers</p> Signup and view all the answers

    What is the purpose of the rule 'Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443'?

    <p>Allow incoming HTTP/S traffic from the corporate network</p> Signup and view all the answers

    What is the primary goal of the developer in maintaining integrity to each module of a program?

    <p>Ensure the code cannot be altered by malicious users</p> Signup and view all the answers

    What is the purpose of Firewall_B in the given architecture?

    <p>Route traffic from web servers to the corporate network</p> Signup and view all the answers

    What is the primary requirement for employees' computing devices in the given corporate firewall architecture?

    <p>Connect to web services over ports 80 and 443</p> Signup and view all the answers

    What is the recommended action based on the RPO requirement of 24 hours?

    <p>Increase the frequency of backups and create SIEM alerts for IOCs</p> Signup and view all the answers

    What is the first step the security analyst should take upon observing suspicious network traffic?

    <p>Investigate web logs to determine if the traffic is normal</p> Signup and view all the answers

    What is the primary concern of the security analyst regarding the malicious piece of code on the Linux system?

    <p>The code is performing a lot of input/output (I/O) on the disk drive</p> Signup and view all the answers

    What should the management team prioritize based on the RPO requirement?

    <p>Increasing the frequency of backups</p> Signup and view all the answers

    What is the most likely reason for the security analyst to investigate the web logs?

    <p>To identify potential security threats</p> Signup and view all the answers

    What should the security analyst do next after identifying the process ID of the malicious code?

    <p>Access the host via EDR and identify processes with network connections</p> Signup and view all the answers

    Who is ultimately responsible for a breach in a cloud-hosted application with a managed database?

    <p>The pharmaceutical company</p> Signup and view all the answers

    What is the primary risk associated with failed API calls in an e-commerce site?

    <p>Damage to the company's reputation</p> Signup and view all the answers

    What is the purpose of a self-healing system?

    <p>To address system unavailability</p> Signup and view all the answers

    What is the primary purpose of the secure storage room?

    <p>To restrict access to authorized personnel</p> Signup and view all the answers

    What is the purpose of the cameras positioned on both sides of the door?

    <p>To identify any unauthorized individuals</p> Signup and view all the answers

    What is the purpose of the card reader issued by the security team?

    <p>To restrict access to authorized personnel</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser