Chapter 13 Review Question Answers

Chapter 13 Review Question Answers

Chapter 13 Review Question Answers

  1. Each of the following is a category of fire suppression systems except a ______.
  1. clean agent system
  2. dry chemical system
  3. wet chemical system
  4. water sprinkler system
  1. Each of the following is required for a fire to occur except ______.
  1. a spark to start the process
  2. a type of fuel or combustible material
  3. sufficient oxygen to sustain the combustion
  4. a chemical reaction that is the fire itself
  1. An electrical fire like that which would be found in a computer data center is known as what type of fire?
  1. Class A
  2. Class B
  3. Class C
  4. Class D
  1. Van Eck phreaking is ______.
  1. blocked by using shielded cabling
  2. picking up electromagnetic fields generated by a computer system
  3. reverse confidentiality
  4. is always used with wireless networks
  1. Plenums are ______.
  1. no longer used today
  2. the air-handling space above drop ceilings
  3. required in all buildings with over six stories
  4. never to be used for locating equipment
  1. RAID _____ uses disk mirroring and is considered fault-tolerant.
  1. Level 1
  2. Level 2
  3. Level 3
  4. Level 4
  1. A standby server exists only to take over for another server in the event of its failure is known as a(n) ______.
  1. asymmetric server cluster
  2. rollover server
  3. failsafe server
  4. symmetric server cluster
  1. RAID is an abbreviation of ______.
  1. Redundant Array of IDE Drives
  2. Resilient Architecture for Interdependent Discs
  3. Redundant Array of Independent Drives
  4. Resistant Architecture of Inter-related Data Storage
  1. Which of the following is an example of a nested RAID?
  1. Level 1-0
  2. Level 0-1
  3. Level 0+1
  4. Level 0/1
  1. A(n) _____ is always running off its battery while the main power runs the battery charger.
  1. off-line UPS
  2. backup UPS
  3. on-line UPS
  4. secure UPS
  1. A(n) _____ is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running.
  1. cold site
  2. warm site
  3. hot site
  4. replicated site
  1. A UPS can perform each of the following except ______.
  1. prevent certain applications from launching that will consume too much power
  2. disconnect users and shut down the server
  3. prevent any new users from logging on
  4. notify all users that they must finish their work immediately and log off
  1. Which of the following is NOT a characteristic of a disaster recovery plan (DRP)?
  1. It is updated regularly.
  2. It is a private document only used by top-level administrators for planning.
  3. It is written.
  4. It is detailed.
  1. Any time the contents of that file are changed, the archive bit is changed to _____ meaning that this modified file now needs to be backed up.
  1. 0
  2. 1
  3. 2
  4. 3
  1. An incremental backup ______.
  1. copies selected files
  2. copies all files
  3. copies all files since last full backup
  4. copies all files changed since last full or incremental backup
  1. Each of the following is a basic question to be asked regarding creating a data backup except ______.
  1. How long will it take to finish the backup?
  2. Where should the backup be stored?
  3. What information should be backed up?
  4. What media should be used?
  1. The chain of ______ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.
  1. forensics
  2. evidence
  3. control
  4. custody
  1. _____ is the maximum length of time that an organization can tolerate between data backups.
  1. Recovery service point (RSP)
  2. Recovery point objective (RPO)
  3. Optimal recovery timeframe (ORT)
  4. Recovery time objective (RTO)
  1. A data backup solution that uses the magnetic disk as a temporary storage area is _____ .
  1. disk to disk to tape (D2D2T)
  2. disk to disk (D2D)
  3. tape to disk (T2D)
  4. continuous data protection (CDP)
  1. When an unauthorized event occurs, the first duty of the computer forensics response should be to _____.
  1. log off from the server
  2. secure the crime scene
  3. back up the hard drive
  4. reboot the system