Beruflich Dokumente
Kultur Dokumente
Middle Term
Quiz 2
2. The unauthorized use of someone’s personal information for the perpetrator’s benefit.
A. SPAM
B. Identity Theft
C. Privacy
D. Flood
6. A facility that is not only prewired for telephone and Internet access but also contains all
the computing and office equipment the organization needs to perform its essential
business activities
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Business Continuity Plan (BCP)
Page 1 of 2
8. Private communication channels, often referred to as tunnels, which are accessible only
to those parties possessing the appropriate encryption and decryption keys.
A. Virtual Private Network (VPN)
B. Internet Protocol version 4 (IPv4)
C. Internet Protocol version 6 (IPv6
D. Local Area Network (LAN)
9. An empty building that is prewired for necessary telephone and Internet access, plus a
contract with one or more vendors to provide all necessary equipment within a specified
period of time
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)
10. Procedures to restore an organization’s IT function in the event that its data center is
destroyed
A. Cold Site
B. Hot Site
C. Second Data-Center
D. Disaster Recovery Plan (DRP)
A. Processing Controls
1.
2.
3.
4.
5.
6.
B. Types of encryptions
7.
8.
9.
Page 2 of 2