Site Considerations
Backups
Power
Testing
3.3 Review
100

This backup site offers a compromise between readiness and cost, requiring some setup time and usually housing essential equipment and data but not at full operational capacity.

Answer: What is a warm site?

100

This type of backup captures only the data that has changed since the last full backup, significantly reducing storage space and backup time.

Answer: What is an incremental backup?

100

This device provides backup power to connected devices during a power outage, ensuring that critical systems can continue to operate without interruption while allowing time for a proper shutdown.

What is an uninterruptible power supply (UPS)?

100

This type of exercise involves gathering key stakeholders to discuss and role-play responses to hypothetical emergency scenarios, aimed at improving communication and coordination during actual incidents.

Answer: What is a tabletop exercise?

100

This process involves deliberately making data difficult to understand or interpret, often used to protect sensitive information by obscuring its true meaning.

Answer: What is obfuscation?

200

This type of site is the least expensive and involves a minimal setup, typically requiring significant time to become operational after a disaster occurs.

Answer: What is a cold site?

200

This backup method combines the benefits of both full and incremental backups by first creating a full backup and then backing up only the changes since the last full backup, optimizing storage while allowing for faster recovery than incremental backups.

Answer: What is a differential backup?

200

This technique involves monitoring and controlling energy usage in data centers to optimize efficiency, reduce costs, and minimize the environmental impact of computing resources.

Answer: What is power management?

200

This process allows systems to automatically switch to a standby server or resource when the primary system fails, ensuring minimal disruption to services and operations.

Answer: What is failover?

200

This practice involves dividing a network into smaller, isolated segments to improve security and control traffic flow, minimizing the risk of unauthorized access and containing potential breaches.

Answer: What is segmentation?

300

This strategy involves placing backup resources across multiple locations to reduce the risk of complete data loss or service interruption due to regional disasters or threats.

Answer: What is geographic dispersion?

300

This process involves categorizing information based on its level of risk if exposed, with categories often including "confidential," "restricted," and "public," to ensure appropriate protection measures are applied.

What is sensitive data classification?

300

This component is designed to protect electrical equipment from surges and spikes in voltage, helping to prevent damage from sudden increases in electrical power.

Answer: What is a surge protector?

300

This strategic approach ensures that essential functions and services can continue during and after a disruptive event, incorporating plans for recovery, resource allocation, and operational resilience.

Answer: What is continuity of operations?

300

This technology uses data from devices to determine their physical location, often used for enhancing security measures, targeting services, or complying with regulations.

Answer: What is geolocation?

400

This technique distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, enhancing availability and performance while improving resource utilization.

Answer: What is load balancing?

400

This technology creates a point-in-time copy of a system or data set, allowing users to revert to a previous state quickly, which is especially useful for data recovery and system restores in virtualized environments.

Answer: What is a snapshot?

400

What is Bro Rigby's favorite vegetable?

What is a pickle?

400

This testing method uses a virtual environment to mimic real-world conditions, allowing organizations to assess their systems and responses without the risk of affecting live operations.

Answer: What is simulation testing?

400

This technique involves hiding sensitive data by replacing it with fictional characters or symbols, allowing organizations to use data for testing and analysis without exposing real information.

Answer: What is data masking?

500

This configuration involves grouping multiple servers to work together as a single system, providing redundancy and failover capabilities, ensuring that if one server fails, the others can take over without service interruption.

Answer: What is clustering?

500

This technique records changes to a database in real time, maintaining a sequential log that allows for recovery of data to a consistent state in case of a failure, enhancing data integrity and minimizing loss.

Answer: What is journaling?

500

This system divides electrical power into manageable segments for distribution to various devices, ensuring proper load balancing and preventing overload conditions.

Answer: What is a power distribution unit (PDU)?

500

In this approach, multiple processes are executed simultaneously to test the system’s ability to handle concurrent operations, assessing performance, reliability, and efficiency under load.

Answer: What is parallel processing testing?

500

This classification level is assigned to information that, if disclosed or compromised, could cause severe damage to an organization, such as significant financial loss or jeopardizing national security, necessitating strict access controls and protection measures.

Answer: What is critical data?