You are on page 1of 8

1.

Each of the following is required for a fire to occur except ______.

A) A type of fuel or combustible material

B) Sufficient oxygen to sustain the combustion

C) A spark to start the process

D) A chemical reaction that is the fire itself

Points Earned: 1.0/1.0


Correct Answer(s): C

2.
An electrical fire like that which would be found in a computer data center is known as what type
of fire?

A) Class A

B) Class B

C) Class C

D) Class D

Points Earned: 1.0/1.0


Correct Answer(s): C

3.
Each of the following is a category of fire suppression systems except a ______.

A) wet chemical system

B) water sprinkler system

C) dry chemical system


D) clean agent system

Points Earned: 1.0/1.0


Correct Answer(s): A

4.
Van Eck phreaking is _______.

A) picking up electromagnetic fields generated by a computer system

B) reverse confidentiality

C) illegal in the U.S.

D) blocked by using shielded cabling

Points Earned: 1.0/1.0


Correct Answer(s): A

5.
Plenums are ______.

A) the air-handling space above drop ceilings

B) required in all buildings above three stories

C) never to be used for locating equipment

D) no longer used today

Points Earned: 1.0/1.0


Correct Answer(s): A

6.
A standby server exists only to take over for another server in the event of its failure is known as
a(n) _______.
A) failsafe server

B) rollover server

C) symmetric server cluster

D) asymmetric server cluster

Points Earned: 1.0/1.0


Correct Answer(s): D

7.
“RAID” is an abbreviation of ________.

A) Resilient Architecture for Interdependent Discs

B) Redundant Array of Independent Drives

C) Redundant Array of IDE Drives

D) Resistant Architecture of Inter-related Data Storage

Points Earned: 1.0/1.0


Correct Answer(s): B

8.
RAID _____ uses disk mirroring and is considered fault-tolerant.

A) Level 0

B) Level 1

C) Level 2

D) Level 5

Points Earned: 1.0/1.0


Correct Answer(s): B
9.
An example of a nested RAID is

A) Level 0+1

B) Level 5-500

C) Level 0

D) Level RA-LS

Points Earned: 1.0/1.0


Correct Answer(s): A

10.
A(n) _____ is always running off its battery while the main power runs the battery charger.

A) on-line UPS

B) off-line UPS

C) backup UPS

D) protected UPS

Points Earned: 1.0/1.0


Correct Answer(s): A

11.
A UPS can perform each of the following except _______.

A) Disconnect users and shut down the server

B) Prevent any new users from logging on

C) Notify all users that they must finish their work immediately and log off
D) Prevent certain applications from launching that will consume too much power

Points Earned: 1.0/1.0


Correct Answer(s): D

12.
A(n) _____ is essentially a duplicate of the production site and has all the equipment needed for
an organization to continue running.

A) warm site

B) hot site

C) cold site

D) resource site

Points Earned: 1.0/1.0


Correct Answer(s): B

13.
Which of the following is NOT a characteristic of a disaster recovery plan (DRP)?

A) It is a private document only used by top-level administrators for planning.

B) It is written.

C) It is detailed.

D) It is updated regularly.

Points Earned: 1.0/1.0


Correct Answer(s): A

14.
Each of the following is a basic question to be asked regarding creating a data backup except
_______.
A) Where should the backup be stored?

B) What information should be backed up?

C) How long will it take to finish the backup?

D) What media should be used?

Points Earned: 1.0/1.0


Correct Answer(s): C

15.
Any time the contents of that file are changed, the archive bit is changed to _____ meaning that
this modified file now needs to be backed up.

A) 0

B) 1

C) 2

D) 3

Points Earned: 1.0/1.0


Correct Answer(s): B

16.
An incremental backup ______.

A) copies all files

B) copies all files since last full backup

C) copies all files changed since last full or incremental backup

D) copies selected files

Points Earned: 1.0/1.0


Correct Answer(s): C

17.
In a grandfather-father-son backup system the weekly backup is called the _____.

A) son

B) father

C) grandfather

D) source

Points Earned: 1.0/1.0


Correct Answer(s): B

18.
_____ is the maximum length of time that an organization can tolerate between data backups.

A) Recovery point objective (RPO)

B) Recovery service point (RSP)

C) Optimal recovery timeframe (ORT)

D) Recovery time objective (RTO)

Points Earned: 1.0/1.0


Correct Answer(s): A

19.
A data backup solution that uses the magnetic disk as a temporary storage area is _____ .

A) disk to disk (D2D)

B) tape to disk (T2D)


C) continuous data protection (CDP)

D) disk to disk to tape (D2D2T)

Points Earned: 0.0/1.0


Correct Answer(s): D

20.
When an unauthorized event occurs, the first duty of the computer forensics response should be
to _____.

A) log off from the server

B) secure the crime scene

C) back up the hard drive

D) reboot the system

Points Earned: 1.0/1.0


Correct Answer(s): B

You might also like