Week 5 – Data Recovery & Backups

1. How can you recover from an unexpected data loss event? Select all that apply.

Answers

·        Restore data from backups

·        Design a disaster recovery plan

·        Write a post-mortem report

·        Recover data from damaged devices

2. What is it best to store backups, physically?

Answers

·        On-site

·        Across multiple locations

·        Off-site

·        In a safe

3. Which of these should be included in your organization’s backups? Select all that apply.

Answers

·        Sales databases

·        A downloads folder

·        Firewall configurations

·        Family vacation photos

4. What's magnetic tape backup media best suited for?

Answers

·        Low-latency cached data

·        Cheap backup systems

·        Quick and efficient backups

·        Long-term archival data

Explanation: The use of magnetic tape as a backup medium is most suited to circumstances involving large-scale data backups as well as long-term archival storage. The storing and preservation of enormous amounts of data is a necessity for many different types of businesses, including government organizations, research institutes, and businesses that deal with vast datasets. Magnetic tape is a frequent storage medium for this kind of data. It is a complementary technology to other storage methods, and the use of it is determined by the particular requirements and qualities of the data that is being stored.

5. Why is it important to test backups and restoration procedures? Select all that apply.

Answers

·        To prove the system is flawless and the IT team deserves a pay raise.

·        To ensure that relevant data is included in the backups

·        To reduce the size of backup data

·        To ensure backups work and data can be restored from them

Explanation: Testing confirms that the data backup procedure is collecting all of the information correctly and in its entirety. It contributes to ensuring that the data that has been backed up may be properly recovered by helping to validate the data's integrity.Testing gives companies the opportunity to discover any problems or faults that may exist in the procedures for backing up and restoring data. Taking care of these problems in advance may assist avoid the loss of data in the case of a genuine catastrophe or data loss event.

6. Which of the following backup types are most space-efficient?

Answers

·        Full backups

·        Differential backups

·        Incremental backups

Explanation: Any data that has been modified since the most recent backup, whether it a full backup or an earlier incremental backup, is the only data that is included in incremental backups. As a consequence of this, they call for a less amount of storage space than complete backups do. Nevertheless, the process of restoring the data can include more than one incremental backup, beginning with the most recent complete backup.

7. What elements should a disaster recovery plan cover? Select all that apply.

Answers

·        Drastic measures

·        Detection measures

·        Preventative measures

·        Recovery measures

8. Why are detection measures included in a disaster recovery plan?

Answers

·        Because it’s important to know when a disaster occurs

·        They aren’t

·        Because they prevent data loss

·        Because they make recovering from data loss easier

9. What are preventative measures?

Answers

·        Measures that are enacted after a disaster has occurred.

·        Measures that are meant to alert you and your team that a disaster has occurred that can impact operations.

·        Redundant systems

·        Measures that cover any procedures or systems in place that will proactively minimize the impact of a disaster.

Explanation: A reduction in the chance of hazards, dangers, or prospective events may be achieved by the use of preventative measures, which are proactive activities and tactics. These precautions are taken in the hope that undesirable occurrences may be avoided entirely or at least have their negative effects lessened. In a variety of settings, preventive actions are taken in order to improve readiness in terms of safety, security, and overall preparedness.

10. What are good detection measures to incorporate in your organization? Select all that apply.

Answers

·        Redundant power supplies

·        Environmental monitoring

·        Backing up firewall rules

·        System performance monitoring

Explanation: By subscribing to threat intelligence feeds, you can ensure that you are always up to date on the most recent cybersecurity risks. Make use of this knowledge to improve your powers of detection.A mix of technology, procedures, and staff knowledge is often required for effective detection measures to be implemented. It is vital to do regular testing and improvements on detection systems in order to guarantee that they continue to be successful in recognizing and neutralizing possible dangers.

11. What are good recovery measures to incorporate in your organization? Select all that apply.

Answers

·        Restoring server configs from backup

·        Following detailed recovery plan documentation

·        Monitoring for internet line outages

·        Maintaining redundant servers

12. What's the main purpose of writing a post-mortem?

Answers

·        To assign legal liability

·        To learn from mistakes and how to improve in the future

·        To assign blame for mistakes

·        To scare people into avoiding risky behavior

Explanation: The primary objective of doing a post-mortem investigation, which is also known as an incident post-mortem or retrospective, is to perform a comprehensive study and record an event or project after it has come to a conclusion. Create a plan of action and provide some suggestions in order to stop future instances like this one from happening. This may entail putting in place new safety precautions, revising existing guidelines, or improving training.

13. What should the timeline in a post-mortem include? Check all that apply.

Answers

·        A detailed analysis of the incident, including root cause and scope

·        Actions taken before, during, and after the event

·        Detailed dates and times

·        A summary of the incident and how long it lasted

14. What is one aspect of post-mortems that are often overlooked?

Answers

·        What went wrong

·        The summary

·        Timelines

·        What went well

Explanation: One component of post-mortem examinations that is sometimes neglected is the significance of accurately recording and appreciating the human aspects and feelings that were present during the occurrence being investigated. The human element is very important in both the incident response and the recovery process, despite the fact that post-mortems often center their attention on technical specifics, underlying causes, and process changes.

15. What is the next step after writing a post-mortem report?

Answers

·        Share the report with other people on your team and/or other teams

·        Do not disclose the report to anyone

·        Destroy the report

·        Nothing, there are no additional steps after writing the report

Explanation: The following phase, which comes after producing a post-mortem report, is to take action in accordance with the findings and suggestions that are detailed in the study. The objective is to strengthen the organization's resiliency while also implementing changes and addressing the underlying causes of problems.

16. What does the summary section of a post-mortem cover?

Answers

·        Description of the incident, how long it lasted, the impact of the incident, and how it was fixed.

·        list of specific actions that should be taken to avoid the same scenario from happening again.

·        Opening catchphrase and witty remarks to introduce the topic

·        Description of the incident

Explanation: The summary portion of a post-mortem provides a condensed account of the occurrence, its effects, as well as the primary findings and suggestions that were generated from the investigation. Stakeholders get a high-level overview of the occurrence as well as the following measures that were done or recommended as a result of it.The objective of the section under "Summary" is to condense the intricate particulars of the post-mortem into an easily consumable style. This will allow stakeholders to acquire an understanding of the crucial facts about the event as well as the organization's reaction and development plan in a short amount of time.

 

17. The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn't go smoothly. You decide to investigate. What is a common term in the IT community for this investigation?

Answers

·        Recovery inspection probe

·        Post-mortem

·        After-outage analysis

·        Post-disaster inquiry

Explanation: It is standard practice in the field of information technology to refer to the inquiry that takes place following a catastrophe or incident as a "post-mortem" or a "post-incident analysis." The purpose of this study is to understand the causes of the event, evaluate the response, and identify areas in which there is room for improvement. This procedure entails conducting a comprehensive investigation of the events that took place before, during, and after the incident in order to draw conclusions from the past experience and improve the organization's level of preparation for such occurrences in the future. The phrase "post-mortem" is often taken from the field of medical forensics, where it describes the process of determining the cause of death by conducting an examination of a corpse after it has been declared dead. Within the realm of information technology and incident response, it places an emphasis on the investigative processes of diagnosis and learning.

 

18. What are advantages of on-site backups? Select all that apply.

Answers

·        Data is more secure because of less outbound traffic

·        * D: There is less bandwidth usage

·        There is quicker data access

·        B: Data is safe in case of disaster

 

19. Which of these are common backup tools you might consider when designing a backup solution? Select all that apply.

Answers

·        Regedit

·        Backup and Restore

·        Time Machine

·        Rsync

 

20. What are good reasons to do yearly disaster recovery testing? Select all that apply.

Answers

·        To create downtime

·        To be prepared for all possible snags or problems

·        To ensure multiple people have appropriate rights and training to restore operations

·        To identify additional vulnerabilities

 

21. Which backup method saves copies of all important files and data at each backup?

Answers

·        RAID array

·        Differential backups

·        Complete backup

·        Incremental backup

Explanation: A "Full Backup" or "Full System Backup" is a kind of backup strategy that, at each point in time when the system is backed up, saves copies of all of the most critical files and data. When you do a complete backup, the whole collection of data and files that you have chosen to back up is transferred and saved in the backup location. All files, directories, apps, and data stored on the system are included here.

 

22. Which of the following issues often make reliable backups for client devices more challenging than for infrastructure devices? Select all that apply.

Answers

·        There are likely to be more client devices to backup compared to infrastructure devices.

·        Data stored on client devices is more valuable than data stored on infrastructure devices.

·        Infrastructure backups do not require complicated scheduling or configuration.

·        Many client devices are mobile and won’t be in the office all the time.

 

23. Some steps of the disaster recovery plan might be time sensitive to ensure there is no data loss or equipment damage. Which element of the disaster recovery plan is designed to address this time sensitivity?

Answers

·        Detection measures

·        Disciplinary measures

·        Corrective or recovery measures

·        Preventative measures

Explanation: The component of a disaster recovery plan that is meant to manage time sensitivity is referred to as the "Recovery Time Objective (RTO)." This component's primary purpose is to guarantee that there will be no loss of data or damage to any equipment. The Recovery Time Objective (RTO) is an important statistic that determines the maximum amount of time that a system or service may be down after it has been affected by a disruption.

24. You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of corrective or recovery measures? Select all that apply.

Answers

·        Hardware repair and replacement

·        Redundancy solutions

·        Restoring data from backup

·        Rebuilding and reconfiguring services

 

25. What are some benefits of a post-mortem? Select all that apply.

Answers

·        To learn from and adapt processes for higher efficiency

·        To understand the cause of mistakes and how to prevent them

·        To punish mistakes

·        To foster a culture where it’s OK to make mistakes

 

26. Which of the following are part of the five primary elements that make up a post-mortem report? Select all that apply.

Answers

·        An accounting of financial costs associated with preventative systems

·        A list of specific actions that should be taken to avoid the same scenario from happening again

·        *C: A description of root causes

·        D: Backup procedures

Explanation: The post-mortem examination resulted in the development of concrete suggestions. In this part, concrete steps to solve identified problems, improve procedures, and increase the organization's resilience are outlined. Changes to operating processes, advancements in technology, and expanded education are examples of possible action items.These components, when taken together, provide a holistic perspective of the event, its root causes, and the organization's reaction to it. The post-mortem report not only acts as record of the occurrence, but it also serves as a significant tool for proactive risk reduction and ongoing improvement.

Shuffle Q/A 1


27. When designing a data backup and recovery plan, what’s the first thing to figure out?

Answers

·        Encryption and bandwidth requirements

·        How much total data you currently have

·        What data you need to backup

·        Future growth in data storage needs

 

28. A data backup strategy needs to prioritize important data and only back up what is necessary for operations. Assuming storage limitations, which of these is LEAST important to back up?

Answers

·        Emails

·        User downloads

·        Databases

·        Financial spreadsheets

Explanation: When developing a strategy for the backup and recovery of data, the first thing that has to be determined is the level of importance attached to both the data and the systems. Organizations are able to adjust their backup and recovery strategies to prioritize the preservation and speedy restoration of the most crucial components if they first determine the criticality of the data and systems they are working with as the first step in the process. This strategic approach makes sure that resources are deployed effectively in order to protect information that is vital to the company and to keep operational resilience high.

 

29. What's the optimal recommended backup storage strategy?

Answers

·        Off-site backups

·        On-site backups

·        A combination of on-site and off-site backups

·        Tape backups

Explanation: A mix of on-site and off-site storage, using both local and remote resources, is often the best and most recommended technique for data backup storage. This helps to guarantee that data is protected and can be recovered in a variety of different situations. An enterprise is able to develop a comprehensive and dependable backup storage plan that covers data protection, recovery goals, and possible hazards associated with a variety of situations by integrating these factors.

 

30. Common concerns with backups are disk failure, lack of redundancy, and increasing disk capacity. Which backup method addresses these concerns?

Answers

·        Differential backups

·        Incremental backup

·        Complete backup

·        RAID array

Explanation: The most effective and widely suggested strategy for the storing of backup data is one that incorporates both on-site and off-site storage, making use of local as well as distant resources. This makes it more likely that the data will be safe and can be retrieved in a range of different scenarios. By combining all of these aspects, a company is able to design a complete and reliable backup storage strategy that addresses data security, recovery objectives, and the potential risks associated with a wide range of scenarios.

 

31. Which type of backup only saves the parts of data that have changed within files since the last backup took place?

Answers

·        Differential backups

·        RAID array

·        Incremental backup

·        Complete backup

Explanation: An "Incremental Backup" is a sort of backup that only stores the sections of data that have changed inside files since the last backup took place. This type of backup is referred to by its full name, "Incremental Backup." The only data that is saved by incremental backups is information that has been changed or added since the last time it was backed up, and this is true regardless of whether the most recent backup was a complete backup or an incremental backup.

 

32. Which of the following are advantages of cloud storage services? Select all that apply.

Answers

·        Users can sync and backup files across platforms and devices.

·        They make it easy for users to configure what files or folders they want to backup.

·        They allow everyone to access a person’s files

·        User backups don’t require complicated scheduling.

 

33. You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of detection measures? Select all that apply.

Answers

·        Using an alert system for outages

·        Monitoring system testing

·        Testing knowledge and readiness for disaster

·        Conducting regular, automated backups

 

34. When are post-mortem reports usually created? Select all that apply.

Answers

·        To punish mistakes

·        When finance asks IT to justify the cost of its preventative systems

·        When something goes wrong

·        At the end of a project

Explanation: Post-mortem reports are often created in response to a number of different types of occurrences in order to investigate the circumstances surrounding the event, determine its underlying causes, and extract lessons for future development. Post-mortem reports are very useful resources for the organizational learning, continuous development, and proactive risk reduction that they provide. They are developed with the intention of reducing the likelihood of future disasters of a similar kind and increasing the overall resilience of the organization.

 

35. Which of the following are components of a post-mortem report? Select all that apply.

Answers

·        A brief summary

·        An explanation of resolution and recovery efforts

·        All log data

·        A detailed timeline of key events

 

36. Which of the following is a critical part of data recovery?

Answers

·        Creating power redundancies

·        Effectively backing up data

·        Port forwarding

·        Stocking replacement drives

 

37. Which of the following are key parts of the disaster recovery testing process? Select all that apply.

Answers

·        Document restoration procedures

·        Replace old hardware

·        Run simulations of disaster events

·        Update all software

 

38. Which element of the disaster recovery plan is designed to proactively minimize the impact of a disaster?

Answers

·        Preventative measures

·        Disciplinary measures

·        Corrective or recovery measures

·        Detection measures

Explanation: It is common practice to refer to the component of a disaster recovery plan that is intended to proactively mitigate the effect of a catastrophe as the "Mitigation Strategies" or "Preventive Measures." These techniques have as their primary goals the prevention of disasters, the reduction of the chance that they will occur, and the lessening of the effects that they may have on the organization.

Shuffle Q/A 2


39. You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of preventative measures? Select all that apply.

Answers

·        Operational documentation

·        Regular, automated backups

·        Redundancy solutions

·        Alert system for outages

 

40. What are the goals of a disaster recovery plan? Select all that apply.

Answers

·        To prevent significant data loss

·        To predict disasters before they happen

·        To keep system downtimes to a minimum

·        To prevent disasters from impacting operations

 

41. What's the purpose of a post-mortem report?

Answers

·        To learn from mistakes

·        To test systems

·        To assign legal liability

·        To identify bad employees

42. Which backup type only backs up files that have changed since the last run?

Answers

·        Full backup

·        Partial backup

·        Incremental backup

·        Differential backup

Explanation: An "Incremental Backup" is a sort of backup that only backs up files that have had changes made to them since the previous time the backup was done. Regardless of whether a full backup or an incremental backup was performed before, incremental backups save just the data that has been added to or altered since the most recent backup. Because only the modified files need to be duplicated, this helps to maximize the use of storage space and cuts down on the amount of time necessary for backups.

43. Why is it important for post-incident analysis to highlight things that went well?

Answers

·        It helps demonstrate the effectiveness of systems in place.

·        It improves team morale.

·        It’s a way to get more money for preventative systems.

·        It minimizes the importance of what went wrong.

 

44. What are advantages of on-site backups? Select all that apply.

Answers

·        There is less bandwidth usage

·        Data is more secure because of less outbound traffic

·        There is quicker data access

·        Data is safe in case of disaster

 

45. What is the standard medium for long-term archival backup data storage?

Answers

·        USB drives

·        Optical disks

·        Magnetic tapes

·        Floppy disks

Explanation: However, it is important to keep in mind that technical breakthroughs are always being made, and various data storage options, such as cloud-based archiving services and optical storage, are gaining popularity. Long-term data storage is something that has been a problem for a long time. The selection of the medium is contingent on a number of criteria, including the particular requirements of the business, the quantity of data, and financial constraints.

46. Which of the following are popular cloud storage platforms? Select all that apply.

Answers

·        Dropbox

·        Rsync

·        Google Drive

·        Apple iCloud

Post a Comment

Previous Post Next Post