1. Which of the following recovery strategies has the GREATEST chance of failure?
A) Hot site B) Redundant site C) Reciprocal arrangement D) Cold site
2. Recovery point objectives (RPOs) can be used to determine which of the following?
A) Maximum tolerable period of data loss B) Maximum tolerable downtime C) Baseline for operational resiliency D) Time to restore backups
3. Which of the following disaster recovery testing techniques is the MOST cost-effective way to determine the effectiveness of the plan?
A) Preparedness tests B) Paper tests C) Full operational tests D) Actual service disruption
4. When electronically stored information is requested during a fraud investigation, which of the following should be the FIRST priority?
A) Assigning responsibility for acquiring the data B) Locating the data and preserving the integrity of the data C) Creating a forensically sound image D) Issuing a litigation hold to all affected parties
5. When creating a forensic image of a hard drive, which of the following should be the FIRST step?
A) Identify a recognized forensics software tool to create the image. B) Establish a chain of custody log. C) Connect the hard drive to a write blocker. D) Generate a cryptographic hash of the hard drive contents.
1. Right Answer: C Explanation: A reciprocal arrangement is an agreement that allows two organizations to back up each other during a disaster. This approach sounds desirable, but has the greatest chance of failure due to problems in keeping agreements and plans up to date. A hot site is incorrect because it is a site kept fully equipped with processing capabilities and other services by the vendor. A redundant site is incorrect because it is a site equipped and configured exactly like the primary site. A cold site is incorrect because it is a building having a basic environment such as electrical wiring, air conditioning, flooring, etc. and is ready to receive equipment in order to operate.
2. Right Answer: A Explanation: The RPO is determined based on the acceptable data loss in the case of disruption of operations. It indicates the farthest point in time prior to the incident to which it is acceptable to recover the data. RPO effectively quantifies the permissible amount of data loss in the case of interruption. It also dictates the frequency of backups required for a given data set since the smaller the allowable gap in data, the more frequent that backups must occur.
3. Right Answer: A Explanation: Preparedness tests would involve simulation of the entire test in phases and help the team better understand and prepare for the actual test scenario. Options B,C and D are not cost-effective ways to establish plan effectiveness. Paper tests in a walk-through do not include simulation and so there is less learning and it is difficult to obtain evidence that the team has understood the test plan. Option D is not recommended in most cases. Option C would require an approval from management is not easy or practical to test in most scenarios and may itself trigger a disaster.
4. Right Answer: B Explanation: Locating the data and preserving data integrity is the only correct answer because it represents the primary responsibility of an investigator and is a complete and accurate statement of the first priority. While assigning responsibility for acquiring the data is a step that should be taken, it is not the first step or the highest priority. Creating a forensically sound image may or may not be a necessary step, depending on the type of investigation, but it would never be the first priority.Issuing a litigation hold to all affected parties might be a necessary step early on in an investigation of certain types, but not the first priority.
5. Right Answer: B Explanation: The first step in any investigation requiring the creation of a forensic image should always be to maintain the chain of custody. Identifying a recognized forensics software tool to create the image is one of the important steps, but it should come after several of the other options. Connecting the hard drive to a write blocker is an important step, but it must be done after the chain of custody has been established. Generating a cryptographic hash of the hard drive contents is another important step, but one that comes after several of the other options.
Leave a comment