Decoded: The Cybersecurity Podcast

ISC2 CC Domain 2: Business Continuity Study Exam Questions by Edward Henriquez


Listen Later

Domain 2: Business Continuity


What is the goal of a Business Continuity Plan (BCP)?

A. Test incident response capabilities

B. Ensure critical business functions continue during a disruption

C. Mitigate cybersecurity vulnerabilities

D. Monitor system performance

Answer: B


Key outcome of a Business Impact Analysis (BIA):

A. Identifying threats

B. Prioritizing critical systems and processes

C. Writing security policies

D. Testing disaster recovery systems

Answer: B


Part of a disaster recovery plan:

A. Incident detection methods

B. Recovery time objectives (RTOs)

C. Employee training manuals

D. Physical security controls

Answer: B


Recovery Point Objective (RPO):

A. Maximum downtime for critical systems

B. Maximum tolerable data loss

C. Time to detect a security incident

D. Frequency of backups

Answer: B


Test simulating a disaster to evaluate response plans:

A. Tabletop exercise

B. Walkthrough drill

C. Full-scale test

D. Functional test

Answer: C


Goal of high availability:

A. Continuous system access

B. Improved system integrity

C. Increased network security

D. Encrypted communication

Answer: A


Backup type copying data changed since the last full backup:

A. Full backup

B. Incremental backup

C. Differential backup

D. Mirror backup

Answer: B


Purpose of redundancy in business continuity:

A. Reduce costs

B. Ensure system reliability

C. Improve encryption

D. Eliminate testing

Answer: B


Alternate site fully operational during a disaster:

A. Hot site

B. Warm site

C. Cold site

D. Shadow site

Answer: A


Difference between disaster recovery and business continuity:

A. Disaster recovery focuses on technology; business continuity on processes.

B. Disaster recovery focuses on processes; business continuity on compliance.

C. Disaster recovery is part of business continuity.

D. They are unrelated.

Answer: C


Purpose of a contingency plan:

A. Steps to respond to unexpected events

B. Methods to eliminate risks

C. Techniques for improving software development

D. Guidelines for encryption protocols

Answer: A


Concept reducing disruption impact by relocating operations:

A. Data recovery

B. Risk mitigation

C. Disaster recovery

D. Continuity of operations

Answer: D


Tool estimating disruption probability and impact:

A. Penetration test

B. Business Impact Analysis (BIA)

C. Security assessment

D. Threat model

Answer: B


Tabletop exercise:

A. Simulated, non-physical test of plans

B. Full activation of business continuity protocols

C. Automated system backup

D. Incident monitoring solution

Answer: A


Ensures data recovery after a disaster:

A. Firewalls

B. Backups

C. Multi-factor authentication

D. Encryption

Answer: B


Document outlining roles during an incident:

A. Business Impact Analysis

B. Disaster Recovery Plan

C. Incident Response Plan

D. Access Control Policy

Answer: C


Difference between RTO and RPO:

A. RTO = downtime; RPO = data loss tolerance.

B. RTO = business processes; RPO = system availability.

C. RTO = mitigation; RPO = recovery.

D. They are identical.

Answer: A


System ensuring uninterrupted power during disasters:

A. UPS (Uninterruptible Power Supply)

B. Load balancer

C. Firewall

D. Proxy server

Answer: A


Purpose of a warm site:

A. Immediate failover

B. Partial functionality with setup required

C. Basic physical location without equipment

D. Duplicates live systems for seamless recovery

Answer: B


Process evaluating disaster recovery plan effectiveness:

A. Penetration testing

B. Backup monitoring

C. Plan testing and exercises

D. Incident response

Answer: C

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Up First from NPR by NPR

Up First from NPR

56,391 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,010 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

David Bombal by David Bombal

David Bombal

25 Listeners