Chapter 13 Review Question Answers
- Each of the following is a category of fire suppression systems except a ______.
- clean agent system
- dry chemical system
- wet chemical system
- water sprinkler system
- Each of the following is required for a fire to occur except ______.
- a spark to start the process
- a type of fuel or combustible material
- sufficient oxygen to sustain the combustion
- a chemical reaction that is the fire itself
- An electrical fire like that which would be found in a computer data center is known as what type of fire?
- Class A
- Class B
- Class C
- Class D
- Van Eck phreaking is ______.
- blocked by using shielded cabling
- picking up electromagnetic fields generated by a computer system
- reverse confidentiality
- is always used with wireless networks
- Plenums are ______.
- no longer used today
- the air-handling space above drop ceilings
- required in all buildings with over six stories
- never to be used for locating equipment
- RAID _____ uses disk mirroring and is considered fault-tolerant.
- Level 1
- Level 2
- Level 3
- Level 4
- A standby server exists only to take over for another server in the event of its failure is known as a(n) ______.
- asymmetric server cluster
- rollover server
- failsafe server
- symmetric server cluster
- RAID is an abbreviation of ______.
- Redundant Array of IDE Drives
- Resilient Architecture for Interdependent Discs
- Redundant Array of Independent Drives
- Resistant Architecture of Inter-related Data Storage
- Which of the following is an example of a nested RAID?
- Level 1-0
- Level 0-1
- Level 0+1
- Level 0/1
- A(n) _____ is always running off its battery while the main power runs the battery charger.
- off-line UPS
- backup UPS
- on-line UPS
- secure UPS
- A(n) _____ is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running.
- cold site
- warm site
- hot site
- replicated site
- A UPS can perform each of the following except ______.
- prevent certain applications from launching that will consume too much power
- disconnect users and shut down the server
- prevent any new users from logging on
- notify all users that they must finish their work immediately and log off
- Which of the following is NOT a characteristic of a disaster recovery plan (DRP)?
- It is updated regularly.
- It is a private document only used by top-level administrators for planning.
- It is written.
- It is detailed.
- Any time the contents of that file are changed, the archive bit is changed to _____ meaning that this modified file now needs to be backed up.
- 0
- 1
- 2
- 3
- An incremental backup ______.
- copies selected files
- copies all files
- copies all files since last full backup
- copies all files changed since last full or incremental backup
- Each of the following is a basic question to be asked regarding creating a data backup except ______.
- How long will it take to finish the backup?
- Where should the backup be stored?
- What information should be backed up?
- What media should be used?
- The chain of ______ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.
- forensics
- evidence
- control
- custody
- _____ is the maximum length of time that an organization can tolerate between data backups.
- Recovery service point (RSP)
- Recovery point objective (RPO)
- Optimal recovery timeframe (ORT)
- Recovery time objective (RTO)
- A data backup solution that uses the magnetic disk as a temporary storage area is _____ .
- disk to disk to tape (D2D2T)
- disk to disk (D2D)
- tape to disk (T2D)
- continuous data protection (CDP)
- When an unauthorized event occurs, the first duty of the computer forensics response should be to _____.
- log off from the server
- secure the crime scene
- back up the hard drive
- reboot the system