0% found this document useful (0 votes)
66 views5 pages

IT474 Quiz 11-2024

The document consists of a series of true/false and multiple-choice questions related to disaster recovery, business continuity, and information security. It addresses concepts such as the cost-effectiveness of hot vs. cold sites, the importance of business impact analysis, and various security measures. The questions also explore the roles of policies and procedures in protecting sensitive information and ensuring operational continuity.

Uploaded by

mohsenah1417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views5 pages

IT474 Quiz 11-2024

The document consists of a series of true/false and multiple-choice questions related to disaster recovery, business continuity, and information security. It addresses concepts such as the cost-effectiveness of hot vs. cold sites, the importance of business impact analysis, and various security measures. The questions also explore the roles of policies and procedures in protecting sensitive information and ensuring operational continuity.

Uploaded by

mohsenah1417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1. Hot sites are more cost-effective than cold sites for disaster recovery.

True

False

2. Which type of backup site is typically the most costly but offers immediate operation after a
disaster?

a.Cold site

b.Frozen site

c.Hot site

d.Temporary site

3. Disaster recovery (DR) plans are only necessary for large-scale events like natural disasters.

True

False

4. Secure off-site storage of vital materials is recommended to protect against internal fraud.

True

False

5. Business impact analysis (BIA) is critical for determining which business functions are essential
for recovery.

True

False

6. System malfunctions should be considered a deliberate threat in information assurance?

True

False
7. Custody Officer for Evidence preserving the chain of evidence by making sure that the
documentation is clear.

True

False

8. A _______________ action is routinely used to ensure that there is no malware installed on your
PC.

a.preventative
b.detective
c.proactive
d.reactive

9. When evaluating the impact of a risk in businesses, loss of availability, confidentiality, and
integrity are taken into account?

True

False

10. Disabling access for a disgruntled employee is a reactive control.

True

False

11. Testing and installing fixes promptly after they are released to reducing the risk of malware.

True

False

12. A business continuity plan (BCP) focuses on maintaining normal business operations despite
disruptions.

True

False
13. Symmetric encryption uses _____________ key(s) for both the encryption and decryption.

a.same

b.different

c.two

d.four

14. Which policy helps prevent unauthorized viewing of sensitive information on unattended
screens?

a.Password policy

b.Clear desk policy

c.Clear screen policy

d.Backup policy

15. Testing a disaster recovery plan ensures it will work effectively during an actual incident.

True

False

16. Which of the following is a type of security control?

a.Marketing

b.Financial

c.Legal

d.Physical

17. Which of the following is a procedural security measure?

a.Data encryption

b.Anti-virus software

c.Non-disclosure agreements

d.Fingerprint locks
18. _____________________ is the protection of information from unauthorized access, use,
disclosure, disruption, modification, and/or destruction.

a.Integrity

b.Availability

c.Confidentiality

d.Accountability

19. What is a clear desk policy primarily designed to prevent?

a.Unauthorized access to sensitive information

b.Physical theft of computers

c.Loss of power supply

d.Cyber-attacks

20. Reviews and audits are crucial to ensuring adherence to current security guidelines, norms, and
regulations.

True

False

21. A non-disclosure agreement is a technical control used to prevent data breaches.

True

False

22. What is the first step in developing a disaster recovery plan (DR)?
a.Testing the plan
b.Implementing security controls
c.Securing off-site storage
d.Conducting a business impact analysis (BIA)
23. What is the main purpose of business continuity planning (BCP)?

a.To restore normal operations after a disaster

b.To prevent cyber-attacks

c.To maintain the continuity of business operations

d.To provide data backup for systems

24. Organizations use risk assessments and business impact analyses to strike a balance between
security precautions and financial concerns.

True

False

You might also like