Page 1562 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1562

remote site at the same time.

                9.  C. Redundant systems/components provide protection against the
                    failure of one particular piece of hardware.


              10.  B. During the business impact assessment phase, you must identify
                    the business priorities of your organization to assist with the
                    allocation of BCP resources. You can use this same information to
                    drive the DRP business unit prioritization.

               11.  C. The cold site contains none of the equipment necessary to
                    restore operations. All of the equipment must be brought in and

                    configured and data must be restored to it before operations can
                    commence. This often takes weeks.

               12.  C. Warm sites typically take about 12 hours to activate from the
                    time a disaster is declared. This is compared to the relatively
                    instantaneous activation of a hot site and the lengthy time (at least
                    a week) required to bring a cold site to operational status.

               13.  D. Warm sites and hot sites both contain workstations, servers, and
                    the communications circuits necessary to achieve operational

                    status. The main difference between the two alternatives is the fact
                    that hot sites contain near-real-time copies of the operational data
                    and warm sites require the restoration of data from backup.

               14.  D. Remote mirroring is the only backup option in which a live
                    backup server at a remote site maintains a bit-for-bit copy of the
                    contents of the primary server, synchronized as closely as the
                    latency in the link between primary and remote systems will allow.


               15.  A. The executive summary provides a high-level view of the entire
                    organization’s disaster recovery efforts. This document is useful for
                    the managers and leaders of the firm as well as public relations
                    personnel who need a nontechnical perspective on this complex
                    effort.

               16.  D. Software escrow agreements place the application source code

                    in the hands of an independent third party, thus providing firms
                    with a “safety net” in the event a developer goes out of business or
                    fails to honor the terms of a service agreement.
   1557   1558   1559   1560   1561   1562   1563   1564   1565   1566   1567