Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which of the following is the best type of recovery process?

    1. A process that maximizes vulnerabilities and impact

    2. A process that identifies vulnerabilities and impact

    3. A manually implemented process

    4. An automated process

  2. Which of the following describes the technology that produces a redundant data set within a single server?

    1. Disk shadowing

    2. Electronic vaulting

    3. Disk mirroring

    4. Collocation

  3. A partition on a disk drive that loses its data due to corruption from a hacker attack is what kind of threat? ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.