Disaster Recovery Back-up Procedures and Recovery Instructions
Learning Objectives and Outcomes
Upon completing this lab, students will be able to:
Relate how to lower RTO with properly documented back-up and recovery steps
Understand the inversely proportional relationship between RTO and redundancy.
Understand the process of defining IT system and application recovery procedures
Understand the risks of using external e-mail as a backup and storage solution for production data.
Week 5 Lab Worksheet
Develop Disaster Recovery Back-up Procedures and Recovery Instructions
Lab Assessment Questions
1 How do documented back-up and recovery procedures help achieve RTO? By recording and applying backup and recovery procedures that are listed, the recovery process is a lot smoother of a process, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO.
2 True or False. To achieve an RTO of 0, you need 100% redundancy in your IT system, application, and data. TRUE
3 Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data back-up? Whats most important when considering a data-backup up is to test the backups to make sure they are going to work when the system needs to be restored. There is no use in backing up a system and never look to see if they are being done properly. If you backup corrupt files, you are then going to restore those corrupt files back into the system. Also having a good backup plan in place would avoid such errors such as the reading states.
4 Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data recovery? Again, testing the restore process and making sure that the data on the tapes is backed up properly. A plan on how the backup is going to be recovered is ideal and a policy needs to be in place for checking the backups as they are done. Another paln would be to not go in blind when recovering hoping that the backups are going to work when they are needed and “crossing your fingers” that the process will go as planned. Monitoring the system is important so that there is knowledge that files are not being backed up. Testing the most recent backup is important.
5 What are the risks of using your external e-mail box as a back-up and data storage solution? The risks using email would be that they are constantly corrupt. Emails are not taken care of by people and known to carry corrupt files and links that should not be on a system. Important emails can be saved in a different location where the initial backup will restore those files if needed. The risk would be restoring corrupt data into the system if they are not deleted prior.
You May Also Find These Documents Helpful
-
The bright field microscope is best known to students and is most likely to be found in a classroom. Visible light is focused through a specimen by a condenser lens, then is passed through two more lenses placed at both ends of a light-tight tube. The latter two lenses each magnify the image. Limitations to what can be seen in bright field microscopy are not so much related to magnification as they are to resolution, illumination, and contrast. Resolution can be improved using oil immersion lenses.…
- 2577 Words
- 11 Pages
Good Essays -
Transfer the uniformly weighted crushed tablets into a beaker and add 100cm3 of dilute sulfuric acid to the beaker.…
- 91 Words
- 1 Page
Satisfactory Essays -
Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…
- 370 Words
- 2 Pages
Good Essays -
If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…
- 406 Words
- 2 Pages
Good Essays -
select LisenceTypeName, sum(licenseTypeEnd) from LicenseType Where LicenseTypeEnd < date> Order by LicenseTypeNameselect Price from licenseType order by count…
- 164 Words
- 2 Pages
Satisfactory Essays -
Create a mapping similar to Figure 1- 2 for the binary number 11 2 using either paper and pencil or a Word document.…
- 3680 Words
- 20 Pages
Satisfactory Essays -
1.) Test for viscosity: Since DNA molecules are long strands that anneal to each other, they can be very viscous in liquid if they're at a high enough concentration. If I notice the sample sticking together while pipetting it, I'll often know that I have a lot of DNA in the sample.…
- 140 Words
- 1 Page
Satisfactory Essays -
1. There are three patterns outlined on the screen. Which one of these is identifying the noise floor?…
- 257 Words
- 2 Pages
Satisfactory Essays -
This work of ECET 370 Week 5 Lab 5 shows the solutions to the following problems:…
- 650 Words
- 3 Pages
Good Essays -
* The onsite updates the responsibility of the onsite IT team, and ultimately the IT supervisor. The responsibility of the restore includes the same people plus the OK from management. All parties need to be kept updated with current…
- 344 Words
- 2 Pages
Satisfactory Essays -
3. From the survey in the toxicology lab, would you be a good candidate to work in this area of forensic science? Why or why not?…
- 589 Words
- 3 Pages
Satisfactory Essays -
As to the changes in circumstances, according from ASC 360-10-35-21(f), Home Computer would, therefore, have to test for a long-lived asset for recoverability.…
- 1517 Words
- 7 Pages
Good Essays -
8. Explain what Recovery Time Objective (RTO) is and why the DRP needs to be written to meet it.…
- 218 Words
- 2 Pages
Satisfactory Essays -
For this kind of scenario, I would have to create a server from scratch so I can be able to identify any types of vulnerabilities on any of these server requirements stated below. Any of these can be at risk at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms are written for Windows but it doesn’t mean Linux can be attacked.…
- 364 Words
- 2 Pages
Good Essays -
Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw.…
- 371 Words
- 2 Pages
Satisfactory Essays