44. a. An application system priority analysis should be performed to determine the business criticality for each computer application. A priority code or time sensitivity code should be assigned to each production application system that is critical to the survival of the organization. The priority code tells people how soon the application should be processed when the backup computer facility is ready. This can help in restoring the computer system following a disaster and facilitate in developing a recovery schedule.
45. Which of the following disaster scenarios is commonly not considered during the development of disaster recovery and contingency planning?
a. Network failure
b. Hardware failure
c. Software failure
d. Failure of the local telephone company
45. d. Usually, telephone service is taken for granted by the recovery team members that could negatively affect Voice over Internet Protocol (VoIP) services. Consequently, it is not addressed in the planning stage. However, alternative phone services should be explored. The other three choices are usually considered due to familiarity and vendor presence.
46. Which of the following phases in the contingency planning and emergency program is most difficult to sell to an organization’s management?
a. Mitigation
b. Preparedness
c. Response
d. Recovery
46. a. Mitigation is a long-term activity aimed at eliminating or reducing the probability of an emergency or a disaster occurring. It requires “up-front” money and commitment from management. Preparedness is incorrect because it is a readiness to respond to undesirable events. It ensures effective response and minimizes damage. Response is incorrect because it is the first phase after the onset of an emergency. It enhances recovery operations. Recovery is incorrect because it involves both short- and long-term restoration of vital systems to normal operations.
47. Which of the following is the best form of a covered loss insurance policy?
a. A basic policy
b. A broad policy
c. A special all-risk policy
d. A policy commensurate with risks
47. d. Because insurance reduces or eliminates risk, the best insurance is the one commensurate with the most common types of risks to which a company is exposed.
The other three choices are incorrect. A basic policy covers specific named perils including fire, lightning, and windstorm. A broad policy covers additional perils such as roof collapse and volcanic action. A special all-risk policy covers everything except specific exclusions named in the policy.
48. Which of the following IT contingency solutions increases a server’s performance and availability?
a. Electronic vaulting
b. Remote journaling
c. Load balancing
d. Disk replication
48. c. Load balancing systems monitor each server to determine the best path to route traffic to increase performance and availability so that one server is not overwhelmed with traffic. Electronic vaulting and remote journaling are similar technologies that provide additional data backup capabilities, with backups made to remote tape or disk drives over communication links. Disk replication can be implemented locally or between different locations.
49. Which of the following can be called the disaster recovery plan of last resort?
a. Contract with a recovery center
b. Demonstration of the recovery center’s capabilities
c. Tour of the recovery center
d. Insurance policy
49. d. According to insurance industry estimates, every dollar of insured loss is accompanied by three dollars of uninsured economic loss. This suggests that companies are insured only for one-third of the potential consequences of a disaster and that insurance truly is a disaster recovery plan of last resort.
50. What should be the last step in a risk assessment process performed as a part of business continuity plan?
a. Consider possible threats.
b. Establish recovery priorities.
c. Assess potential impacts.
d. Evaluate critical needs.
50. b. The last step is establishing priorities for recovery based on critical needs. The following describes the sequence of steps in a risk assessment process: