Computer Science Homework Help

Computer Science Homework Help. How do documented backup and recovery procedures help achieve RTO?, lab assessment help

Lab
Assessment Questions & Answers Part 1—use this website and questions for both parts

file:///C:/Users/Jamie/Downloads/Lab09_SLMx_Risk20%20(3).pdf

1. How do documented backup and recovery procedures
help achieve RTO?

2. True or false: To achieve an RTO of 0, you need 100
percent redundant, hot-stand-by

infrastructure (that is, IT systems, applications,
data, and so on).

True

3. What is most important when considering data
backups?

The most important thing to know when considering data
backups is

4. What is most important when considering data
recovery?

The most important thing when considering data
recovery is quality and a quick recovery

5. What are the risks of using your external e-mail
box as a backup and data storage solution?

6. Identify the total amount of time required to
recover and install the Lab Assessment Worksheet(s) and to open the file(s) to
verify integrity. (Calculate your timed RTO using your computer clock and your
documented instructions.)

7. Did you achieve your RTO? What steps and procedures
can you implement to help drive RTO

even lower?

8. What are some recommendations for lowering the RTO
for retrieval and access to the backup data file?

9. If you drive RTO lower, what must you do to
streamline the procedure?

10. Why are documenting and testing critical to
achieve a defined RTO?

11. Why is it a best practice for an organization to
document its backup and recovery steps for disaster

recovery?

12. What can you do to cut down on the recovery time
for accessing, copying, and recovering your

Lab Assessment Worksheets to achieve the RTO?

13. What will encryption of a disk or data in storage
do to the RTO definition when attempting to

retrieve and recover cleartext data for production
use?

14. How many total steps did your backup and recovery
procedures consist of for this lab exercise? Are there any that can be combined
or streamlined?

15. If the individual accessing the system for
disaster recovery purposes were not familiar with the IT system and required
system administrator logon credentials, what additional step would be required
in the recovery phase?

Part
2

Lab Assessment Questions & Answers—–Use this
website file:///C:/Users/Jamie/Downloads/Lab10_SLMx_Risk20%20(2).pdf

1. What risk-mitigation security controls or security
countermeasures do you recommend

for the portion of the network for which you created a
CIRT response plan? Explain your

answer.

2. How does a CIRT plan help an organization mitigate
risk?

The CIRT helps the organization be prepared for
incidents and able to respond much quicker to the incident.

3. How does the CIRT post-mortem review help mitigate
risk?

To be able to get to the incident faster.

4. Why is it a good idea to have a protocol analyzer
as one of your incident response tools

when examining Internet Protocol (IP) Local Area
Network (LAN) network performance

or connectivity issues?

5. Put the following in the proper sequence:

Identification:

Containment:

Post-Mortem Review:

Eradication:

Preparation:

Recovery:

6. Which step in the CIRT response methodology relates
back to the recovery time objective

(RTO) for critical IT systems?

7. Which step in the CIRT response methodology
requires proper handling of digital

evidence?

8. Which step in the CIRT response methodology
requires review with executive

management?

9. Which step in the CIRT response methodology
requires security applications and tools

readiness?

Computer Science Homework Help

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"