CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 27
30. A(n) ____ is often included in legal documents to ensure that a
vendor is not liable for actions taken by a client.
31. An organization aggregates all local backups to a central
repository and then backs up that repository to an online vendor, with
a ____ backup strategy.
32. A ____ is commonly a single device or server that attaches to a
network and uses TCP/IP-based protocols and communications
methods to provide an online storage environment.
33. A potential disadvantage of a ____ site-resumption strategy is
that more than one organization might need the facility
simultaneously.
34. Some recovery strategies seek to improve the ____ of a server or
system in addition to, or instead of, performing backups of data.
35. RAID 0 creates one logical volume across several available hard
disk drives and stores the data using ____, in which data segments are
written in turn to each disk drive in the array.
36. The determination of what systems fall under the CSIRT ’s
responsibility is called its ____.
37. Those services performed in response to a request or a defined
event such as a help desk alert are called ____.
38. In the absence of the assigned team manager, the ____ should
assume authority for overseeing and evaluating a provided service.
39. When an organization completely outsources its IR work,
typically to an on-site contractor, it is called a(n) ____ model.
40. The champion for the CSIRT may be the same person as the
champion for the entire IR function—typically, the ____.
41. A CSIRT model that is effective for large organizations and for
organizations with major computing resources at distant locations is
the ____.