Mainframes are perceived as being more robust

Assignment Help Basic Computer Science
Reference no: EM13714421

QUESTION 1
Mainframes are perceived as being more robust than n-tier server architectures.
True
False
QUESTION 2
The key role of a DR plan is defining how to reestablish operations at the location where the organization is usually located.
True
False
QUESTION 3
When the primary site has been restored to working order, all business functions must return at the same time.
True
False
QUESTION 4
A(n) is a detailed examination of the events that occurred, from first detection to final recovery.

QUESTION 5
Blended attacks can occur via any type of Internet or network service, such as e-mail, Web servers or clients, and Windows shares.
True
False
QUESTION 6
occur over time and slowly deteriorate the organization's capacity to withstand their effects.
QUESTION 7
A(n) must support the immediate reestablishment of operations at an alternate site and eventual reestablishment of operations back at the primary site.
QUESTION 8
occurs when management had a responsibility to do something, in line with due diligence or due care, but did not do anything or did the wrong things.
QUESTION 9
A(n) is the list of officials, ranging from an individual's immediate supervisor to the top executive of the organization.



QUESTION 10
The term refers to the process of accounting for all personnel - that is, determining each individual's whereabouts - during an emergency.
QUESTION 11
is the use of forensics techniques when the source of evidence is a computer system.
QUESTION 12
Network IDPSs cannot detect all incidents, especially those attacks that are not network-based.
True
False
QUESTION 13
A(n) is a scripted description of the disaster and consists of just enough information so that each responder knows what portion of the DR plan to implement without impeding the notification process.
QUESTION 14
represents the final response of the organization when faced with any interruption of its critical operations.
QUESTION 15
The phase involves activating the DR plan and following the steps outlined therein.
QUESTION 16
A(n) is a collection of nodes in which the segments are geographically dispersed.
QUESTION 17
are those that occur suddenly, with little warning, taking the lives of people and destroying the means of production.
QUESTION 18
The is the amount of time that the business can tolerate until the alternate capabilities are available.
QUESTION 19
A(n) is an information system with a telephony interface that can be used to automate the alert process.
QUESTION 20
The term is used to describe the group responsible for the process of initiating the occupation of the alternate facility.
QUESTION 21
A(n) is a significant business disruption with a direct impact on the lives, health, and welfare of an organization and its employees.
QUESTION 22
The term means making an organization ready for possible contingencies that can escalate to become disasters.
QUESTION 23
is the movement of employees among positions at the same organizational level rather than through progression and promotion.
QUESTION 24
The SP must include its own mission statement or statement of purpose as well as be a uniquely customized approach for the needs of the specific organization for which it is developed.
True
False
QUESTION 25
The initial determination of the scope of the breach of confidentiality, integrity, and availability of information and information assets is called the .
QUESTION 26
is simply a human response that is part of dealing with the inexplicable travesty associated with loss - loss of life, limb, or property.
QUESTION 27
is the legal component of civil law whereby one party can obtain evidence from the opposing party through specific requests for information.




QUESTION 28
The BC plan should identify how staffing operations will function and who is responsible for overseeing and implementing them.
True
False
QUESTION 29
is the use of methodical technical investigation and analysis techniques to identify, collect, preserve, and analyze objects and information of potential evidentiary value so that it may be admitted as evidence in a court of law, used to support administrative action, or simply used to further analyze suspicious events.
QUESTION 30
involves an attempt made by those who may become subject to digital forensic techniques to obfuscate or hide items of evidentiary value.
QUESTION 31
The term is used is in the military and government sectors to represent the process of moving out of temporary facilities and returning them back to the owners or managers.




QUESTION 32
Mitigation of impact is the inclusion of action steps to minimize the damage associated with the disaster on the operations of the organization.
True
False
QUESTION 33
is the preparation for and recovery from a disaster, whether natural or man-made.

QUESTION 34
is the process of preparing for, responding to, recovering from, and managing communications during a crisis.
QUESTION 35
During the phase, the organization begins the recovery of the most time-critical business functions - those necessary to reestablish business operations and prevent further economic and image loss to the organization.
QUESTION 36
is the process that enables an organization to cope with any loss of personnel with a minimum degree of disruption to the functionality of the organization, by predefining the promotion of internal personnel usually by position.


QUESTION 37
The primary goal of the phase is to repair all damage to the primary site or select or build a replacement facility.
QUESTION 38
is information, graphics, images, or any other physical or electronic item that could have value as evidence in a legal proceeding, whether criminal or civil.
QUESTION 39
The mainframe is a large, multi-user system designed to provide both computational capacity and high-volume data storage support for large organizations.
True
False
QUESTION 40
is defined as the search for, collection, and review of items stored in electronic (or, more precisely, digital) format that are of potential evidentiary value based on criteria specified by a legal team.
QUESTION 41
The is simply a legal record of where the evidence was at each point in its lifetime and documentation of each and every access to it.


QUESTION 42
is the rapid relocation of an organization's critical business functions to an alternate location until such time as the organization is able to return to the primary site or relocate to a new permanent facility.
QUESTION 43
The maintenance of the IR plan is a trivial commitment for an organization.
True
False
QUESTION 44
is the determination of the initial flaw or vulnerability that allowed the incident to occur; it is done by examining the systems, networks, and procedures that were involved.
QUESTION 45
when an individual, an application, or another program, through access to the operating system's application programming interface (API), attempts to and/or gains access to an information asset without explicit permission or authorization to do so.
QUESTION 46
is functionally similar to job rotation but only involves the rotation of a portion of a job.


QUESTION 47
The goal of the is to initiate implementation of secondary functions.
QUESTION 48
is a category of incidents that covers a spectrum of violations made by authorized users of a system who nevertheless use the system in ways specifically prohibited by management.
QUESTION 49
are those individuals who are hired above and beyond the minimum number of personnel needed to perform a business function
QUESTION 50
is the movement of employees from one position to another so they can develop additional skills and abilities.

Reference no: EM13714421

Questions Cloud

Use a common data center of twenty : Analyze and explain how you would use DNS in your plan. Compose a two-paragraph executive summary highlighting the main points of your plan. Use at least three (3) quality resources in this assignment.
Implement unsigned 8-bit multiplication and division algorit : Implement unsigned 8-bit multiplication and division algorithms in MIPS assembly language. You need to follow the multiply and divide algorithms as given in the textbook or the slides. You must NOT use any MIPS multiplication or division instru..
Explain how the maxflow algorithm works : Explain how the maxflow algorithm works, elaborating on all cases and transitions that need to be considered during execution.
Identify the java-based technologies utilized : Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.
Mainframes are perceived as being more robust : QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False
Compare and contrast physical access controls : Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Exploited both network and host vulnerabilities : Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..
The term means making an organization ready : QUESTION 1 The term means making an organization ready for possible contingencies that can escalate to become disasters.QUESTION 2 Mainframes are perceived as being more robust than n-tier server architectures.
Analysis summarizing the wireless design : Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Create directories in home directory begin-mac-mac directory

Create following directories in your home directory cp_even, cp_mid,cp_iso,cp,thousand,cp_even. Examine files in the /usr/share/tcl8.3/encoding directory copy all files which begin with mac into mac directory.

  Examine and analyze the principles of polymorphism

Examine and analyze the principles of polymorphism, inheritance and encapsulation. Use the Library to get started on finding resources.

  The menu structure for holiday travel vehicle

The menu structure for Holiday Travel Vehicle

  Imagine an online registration application

Imagine an online registration application. Use your registration form as starting point for your analysis. Identify the entities that a potential database will need, along with their attributes. Try to establish unique identifiers for the records in..

  Can rtp be designed to eliminate the sequence number field

The RTP incorporates a sequence number filed in addition to the timestamp field. Can RTP be designed to eliminate the sequence number field and use the timestamp field to resequence the out-of-order received packets? Justify your answer.

  Explaining dns zone in secure dynamic updates

If a DNS zone accepts only secure dynamic updates and the DHCP server is a member of the DnsUpdateProxy security group.

  Address three components represented in cell

Assume that a security model is needed for protection of information in your class. Write a brief statement on how you would address the three components represented in that cell.

  Describe how concepts such as risc

In this six pages research paper, you will investigate the evolution of and current trends in improving system performance with concepts such as RISC, pipelining, cache memory, and virtual memory. In this paper you must, as part of your conclus..

  Identify and explain some different types of risks

Identify and explain some different types of risks that a network environment might face.

  Explain use of gross domestic product-measure business cycle

Explain the use of Gross Domestic Product (GDP) to measure business cycle. Explain the roles of government bodies which determine national fiscal policies.

  A good file management system

A good file management system is necessary to organize your files. A file management system is made up of files and file folders. You can copy, delete, rename and move these files and folders around as like.

  Deployment and ongoing operation after implementations

Your plan requires two sections, one for deployment and another for ongoing operation after implementation. The vendor offers a contracting service for installation at $140 per hour.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd