“Creating a Patch and Vulnerability Management Program (NIST SP800-40V2),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, November 2005.
“Engineering Principles for IT Security (NIST SP800-27 Revision A),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, June 2004.
“Guide to Malware Incident Prevention and Handling (NIST SP800-83),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, November 2005.
“Guide to Storage Encryption Technologies for End User Devices (NIST SP800-111Draft),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, August 2007.
“Guidelines for Media Sanitization (NIST SP800-88 Revision 1),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, September 2006.
Walden, Bob. “Data Storage Management.” An NSS Group’s White Paper, 1991–2001.
Traditional Questions, Answers, and Explanations
1. Which of the following information technology (IT) contingency solution for servers minimizes the recovery time window?
a.
Electronic vaultingb.
Remote journalingc.
Load balancingd.
Disk replication2. Which of the following IT contingency solutions for servers provides high availability?
a.
Network-attached storageb.
System backupsc.
Redundant array of independent disksd.
Electronic vaulting3. Regarding contingency planning, which of the following IT platforms requires vendor service-level agreements?
a.
Desktop computersb.
Serversc.
Distributed systemsd.
Wide-area networks4. Regarding business continuity planning (BCP) and disaster recovery planning (DRP), which of the following contingency solutions for wide-area networks (WANs) increases vulnerability to hackers?
a.
Redundant communication linksb.
Multiple network service providersc.
Multiple Internet connectionsd.
Redundant network connecting devices