Individual file restores, by their name, restore the last version of a file that was written to media because it was deleted by accident or ruined. Redirected restores store files on a different location or system than the one they were copied from during the backup operations. Group file restores handle two or more files at a time.
164. Which of the following file backup strategies is preferred when a full snapshot of a server is required prior to upgrading it?
a.
Full backupsb.
Incremental backupsc.
Differential backupsd.
On-demand backupsFull backups are incorrect because they copy all data files and programs. It is a brute force method providing a peace of mind at the expense of valuable time. Incremental backups are incorrect because they are an inefficient method and copy only those files that have changed since the last backup. Differential backups are incorrect because they copy all data files that have changed since the last full backup. Only two files are needed to restore the entire system: the last full backup and the last differential backup.
165. Which one of the following database backup strategies is executed when a database is running in a local-area-network environment?
a.
Cold backupb.
Hot backupc.
Logical backupd.
Offline backupThe idea of cold backup is to shut down the database and back it up while no end users are working on the system. This is the best approach where data integrity is concerned, but it does not service the customer (end user) well.
Logical backups use software techniques to extract data from the database and write the results to an export file, which is an image file. The logical backup approach is good for incremental backups. Offline backup is another term for cold backup.
166. Contrary to best practices, information systems’ security training is usually
a.
Information systems security staffb.
Functional usersc.
Computer operations staffd.
Corporate internal audit staffThe information systems’ security staff is provided with periodic training to keep its knowledge current. Functional users will definitely be given training so that they know how to practice security. Corporate internal audit staff is given training because it needs to review the IT security goals, policies, procedures, standards, and practices.
167. Which one of the following is a direct example of social engineering from a computer security viewpoint?
a.
Computer fraudb.
Trickery or coercion techniquesc.
Computer theftd.
Computer sabotage