{"id":580,"date":"2021-01-17T05:36:02","date_gmt":"2021-01-16T18:02:25","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0572\/"},"modified":"2021-01-17T05:44:25","modified_gmt":"2021-01-17T05:44:25","slug":"systems-security-certified-practitioner-sscp-question0572","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0572\/","title":{"rendered":"Systems Security Certified Practitioner &#8211; SSCP &#8211; Question0572"},"content":{"rendered":"<div class=\"question\">To protect and\/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of: <br \/><strong><br \/>A.<\/strong> Remote journaling. <br \/><strong>B.<\/strong> Database shadowing. <br \/><strong>C.<\/strong> A tape backup method. <br \/><strong>D.<\/strong> Mirroring.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nThe purpose of a tape backup method is to protect and\/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and ensuring availability.<br \/>\nAll other choices could suffer from corruption and it might not be possible to restore the data without proper backups being done.<br \/>\nThis is a tricky question, if the information is lost, corrupted, or deleted only a good backup could be use to restore the information. Any synchronization mechanism would update the mirror copy and the data could not be recovered.<br \/>\nWith backups there could be a large gap where your latest data may not be available. You would have to look at your Recovery Point Objective and see if this is acceptable for your company recovery objectives.<br \/>\nThe following are incorrect answers:<br \/>\nMirroring will preserve integrity and restore points in all cases of drive failure. However, if you have corrupted data on the primary set of drives you may get corrupted data on the secondary set as well.<br \/>\nRemote Journaling provides Continuous or periodic synchronized recording of transaction data at a remote location as a backup strategy. (<a href=\"http:\/\/www.businessdictionary.com\/definition\/remote-journaling.html)\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.businessdictionary.com\/definition\/remote-journaling.html)<\/a> With journaling there might be a gap of time between the data updates being send in batch at regular interval. So some of the data could be lost.<br \/>\nDatabase shadowing is synonymous with Mirroring but it only applies to databases, but not to information and data as a whole.<br \/>\nReference(s) used for this question: KRUTZ, Ronald L. &#038; VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley &#038; Sons, Page 68.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>To protect and\/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of: A. Remote journaling. B. Database shadowing. C. A tape backup method. D. Mirroring. Show Answer Hide Answer Correct Answer: C Explanation: The purpose of a tape backup method is to protect and\/or restore lost, corrupted, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1078,575,3],"class_list":["post-580","post","type-post","status-publish","format-standard","hentry","category-systems-security-certified-practitioner-sscp","tag-choices","tag-question-0572","tag-systems-security-certified-practitioner-sscp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/comments?post=580"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/580\/revisions"}],"predecessor-version":[{"id":1656,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/580\/revisions\/1656"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/media?parent=580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/categories?post=580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/tags?post=580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}