“Creating a Patch and Vulnerability Management Program (NIST SP800-40V2),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, November 2005.
“Engineering Principles for IT Security (NIST SP800-27 Revision A),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, June 2004.
“Guide to Malware Incident Prevention and Handling (NIST SP800-83),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, November 2005.
“Guide to Storage Encryption Technologies for End User Devices (NIST SP800-111Draft),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, August 2007.
“Guidelines for Media Sanitization (NIST SP800-88 Revision 1),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, September 2006.
Walden, Bob. “Data Storage Management.” An NSS Group’s White Paper, 1991–2001.
Traditional Questions, Answers, and Explanations
1. Which of the following information technology (IT) contingency solution for servers minimizes the recovery time window?
a. Electronic vaulting
b. Remote journaling
c. Load balancing
d. Disk replication
2. Which of the following IT contingency solutions for servers provides high availability?
a. Network-attached storage
b. System backups
c. Redundant array of independent disks
d. Electronic vaulting
3. Regarding contingency planning, which of the following IT platforms requires vendor service-level agreements?
a. Desktop computers
b. Servers
c. Distributed systems
d. Wide-area networks
4. Regarding business continuity planning (BCP) and disaster recovery planning (DRP), which of the following contingency solutions for wide-area networks (WANs) increases vulnerability to hackers?
a. Redundant communication links
b. Multiple network service providers
c. Multiple Internet connections
d. Redundant network connecting devices