O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which of the following is the best type of recovery process?

    1. A process that maximizes vulnerabilities and impact

    2. A process that identifies vulnerabilities and impact

    3. A manually implemented process

    4. An automated process

  2. Which of the following describes the technology that produces a redundant data set within a single server?

    1. Disk shadowing

    2. Electronic vaulting

    3. Disk mirroring

    4. Collocation

  3. A partition on a disk drive that loses its data due to corruption from a hacker attack is what kind of threat? ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required