A privacy threshold analysis
is a questionnaire used to determine if a system contains personally identifiable information (PII), whether a PIA is required, whether a System of Records Notice (SORN) is required, and if any other privacy requirements apply to the information system.
What type of assessment can determine if a system contains PII whether a privacy impact assessment is required and if any other privacy requirements apply to the IT system group of answer choices?
Privacy Threshold Analysis (PTA)
: The privacy threshold analysis identifies whether the system collects and maintains PII, and whether additional privacy compliance documentation, such as a PIA or system of records notice (SORN), is required.
Which refers to a snapshot of the current state of a computer that contains all current settings and data is known at the moment in time?
Explain how to best secure volatile data. ANSWER: Securing volatile information can best be performed by capturing
the entire system image
, which is a snapshot of the current state of the computer that contains all current settings and data.
Is a snapshot of the current state of the computer that contains all current settings and data?
Term asymmetric server cluster Definition A technology in which a standby server exists only to take over for another server in the event of its failure. | Term system image Definition A snapshot of the current state of the computer that contains all settings and data. |
---|
What value refers to the average amount of time until a component fails Cannot be repaired?
Mean time to failure (MTTF)
is a maintenance metric that measures the average amount of time a non-repairable asset operates before it fails. Because MTTF is relevant only for assets and equipment that cannot or should not be repaired, MTTF can also be thought of as the average lifespan of an asset.
How do I do a privacy impact assessment?
- Confirm the need for a PIA.
- Plan.
- Consult (include OPC )
- Assess necessity and proportionality.
- Identify and assess specific risks.
- Create measures to mitigate.
- Get approval.
- Report to TBS and OPC.
What is the purpose of a Privacy Impact Assessment PIA )?
PIA Overview
The objective of the PIA is
to systematically identify the risks and potential effects of collecting, maintaining, and disseminating PII and to examine and evaluate alternative processes for handling information to
mitigate potential privacy risks.
What is the difference between a backup and a snapshot?
Backup can be stored in another location
, same server, or even the same drive in this case. Snapshots can be stored only in the same location where original data is present. … Backup comprises of only file system. Snapshots comprises of different types of systems like the files, software, and settings of that type.
What are five major elements of a typical disaster recovery plan?
- Create a disaster recovery team. …
- Identify and assess disaster risks. …
- Determine critical applications, documents, and resources. …
- Determine critical applications, documents, and resources. …
- Specify backup and off-site storage procedures.
What specific way can disaster recovery plans be tested group of answer choices?
- Paper test: Individuals read and annotate recovery plans.
- Walkthrough test: Groups walk through plans to identify issues and changes.
- Simulation: Groups go through a simulated disaster to identify whether emergency response plans are adequate.
How can an administrator keep devices powered when power is interrupted quizlet?
Terms in this set (40) How can an administrator keep devices powered when power is interrupted?
Most metadata about a file is generated and recorded automatically without the user's knowledge.
What kind of data can be lost when a computer is turned off?
RAM is a type of
volatile memory
because it will lose its data if the power is turned off. ROM or Read Only Memory is a type of non-volatile memory which means it keeps its data even if the power is turned off.
What kind of slack is created from information stored on a hard drive?
File Slack
, also called ‘slack space', is the leftover space on a drive where a file is stored. This space remains empty or left over because each cluster on a disk has a storage threshold and files are random sizes.
What is MTBF if no failure?
Mean time between failures (MTBF) is a
prediction of the time between the innate failures of a piece of machinery during normal operating hours
. In other words, MTBF is a maintenance metric, represented in hours, showing how long a piece of equipment operates without interruption.
What is MTTR and MTBF formula?
MTBF = Total uptime / # of Breakdowns
. MTBF analysis helps maintenance departments strategize on how to reduce the time between failures. Together, MTBF and MTTR determine uptime. To calculate a system's uptime with these two metrics, use the following formula: Uptime = MTBF / (MTBF + MTTR)
How is MTBF calculated?
To calculate MTBF,
divide the total number of operational hours in a period by the number of failures that occurred in that period
. MTBF is usually measured in hours. For example, an asset may have been operational for 1,000 hours in a year. Over the course of that year, that asset broke down eight times.