Course 4 – System Administration and IT Infrastructure Services

1. How can you recover from an unexpected data loss event? Check all that apply.

  • Write a post-mortem report.
  • Recover data from damaged devices. 
  • Restore data from backups. 
  • Design a disaster recovery plan.

2. Where is it best to store backups, physically?

  • On-site
  • Off-site
  • In a safe
  • Across multiple locations 

Explanation: It is crucial to strike a balance between redundancy, security, and accessibility in accordance with the specific requirements of your organization and the importance of the backed-up data. Consistent surveillance and testing of backup and recovery procedures are additionally critical in order to ascertain the efficacy of the selected storage solution.

3. Which of these should be included in your backups? Check all that apply.

  • Firewall configurations 
  • A downloads folder
  • Family vacation photos
  • Sales databases 

4. What’s magnetic tape backup media best suited for?

  • Long-term archival data  
  • Low-latency cached data
  • Cheap backup systems
  • Quick and efficient backups

5. Why is it important to test backups and restoration procedures? Check all that apply.

  • To reduce the size of backup data
  • To speed up the backup-and-restore process
  • To ensure backups work and data can be restored from them 
  • To ensure that relevant data is included in the backups 

6. Which of the following backup types are most space-efficient?

  • Full backups
  • Differential backups
  • Incremental backups 

Explanation: Differential backups offer a compromise between space efficiency and restore procedure simplicity. While they capture more data than incremental backups, they are more space-efficient than complete backups.The selection between differential and incremental backups is contingent upon various considerations, including backup frequency, storage capacity, and the preferred trade-off between space efficiency and restore simplicity.

7. True or false: You can use a RAID array and use rsync to copy critical data to it for backups.

  • True
  • False 

Explanation: In conclusion, it is advisable to integrate a RAID array with rsync for routine backups in order to bolster data redundancy and mitigate the risk of hardware malfunctions. Nevertheless, it is imperative to supplement this with a comprehensive backup strategy that encompasses a wide range of potential data loss scenarios.

8. What elements should a disaster recovery plan cover? Check all that apply.

  • Detection measures 
  • Preventative measures 
  • Recovery measures 
  • Drastic measures 

9. Why are detection measures included in a disaster recovery plan?

  • They aren’t
  • Because it’s important to know when a disaster occurs 
  • Because they prevent data loss
  • Because they make recovering from data loss easier

Explanation: In conclusion, it is critical for organizations to incorporate detection measures into their disaster recovery plans in order to proactively identify potential threats and incidents. This allows them to safeguard their assets, operations, and data through prompt and effective responses.

10. What are good preventative measures to incorporate in your organization? Check all that apply.

  • Monitoring and alerting systems
  • Redundant systems 
  • Regular backups 
  • Accessible and up-to-date documentation 

Explanation: Organizations can mitigate the likelihood of cybersecurity incidents and establish a robust security posture by implementing the aforementioned preventative measures. It is critical to customize these metrics in accordance with the particular requirements and attributes of the institution.

11. What are good detection measures to incorporate in your organization? Check all that apply.

  • Environmental monitoring 
  • Backing up firewall rules
  • Redundant power supplies
  • System performance monitoring 

Explanation: Through the integration of these detection measures, organizations can substantially bolster their capacity to recognize and address security incidents, thereby augmenting their cybersecurity resilience as a whole. It is worth noting that a multifaceted and integrated approach to detection is frequently the most effective.

12. What are good recovery measures to incorporate in your organization? Check all that apply.

  • Restoring server configs from backup 
  • Following detailed recovery plan documentation 
  • Monitoring for internet line outages
  • Maintaining redundant servers

Post a Comment

Previous Post Next Post