Preview

Lab 9

Good Essays
Open Document
Open Document
616 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 9
IS3110 – Risk Management
Lab # 9 – Develop recovery back-up procedures and recovery instructions

1. How does documented back-up and recovery procedures help achieve RTO? By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO.
2. True or False. To achieve an RTO of 0, you need 100% redundant, hot-stand-by infrastructure (i.e., IT system, application, and data, etc.). True
3. What is most important when considering data back-up? Registry, directories, and imperative operating data as well as licensing.
4. What is most important when considering data recovery? Data recovery working in a timely manner (fast).
5. What are the risks of using your external e-mail box as a back-up and data storage solution? First, you are at the mercy of the provider. If it is a large recovery you may not be able to have internet access to download it. File corruption could be an issue as well as back up size allowable for email.
6. Identify the Total Amount of Time Required to Recover and Install the Lab #9 Assessment Worksheets on Your Student VM Hard Drive and open the file in Microsoft Word to verify integrity. {Insert your timed RTO using your computer clock – following your documented instructions and steps}. N/A.
7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower? I’m assuming from the lab, steps that would be with better equipment, a Hot-Site and lots of money.
8. What are some recommendations for lowering the RTO for retrieval and access to the back-up data file? Have a good recovery system; the recovery software could be as low as 15min. with some products. Making sure they are available and tested regularly.
9. If you drive RTO lower

You May Also Find These Documents Helpful

  • Powerful Essays

    PT2520

    • 1263 Words
    • 7 Pages

    The course project is based on the Westlake Research Hospital scenario that you have been studying throughout the course and uses the Westlake database you used for the Group A labs. To complete the project, you will need to use your copy of the SQL2008ExpVM virtual machine, as it existed at the end of the last unit (Unit 9). Your instructor will provide you with a script file named ProjectLoadData.sql, which you will use to populate the database. You will receive instructions on how to use this file in Step 10 of the Technical Steps section of this lab.…

    • 1263 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    In this exercise, you will create a connection that enables the workstation to connect to your server using virtual private networking.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 995 Words
    • 4 Pages

    d. How well does each flip (or half-life) actually eliminate half of the remaining parent isotopes?…

    • 995 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    8. Explain what Recovery Time Objective (RTO) is and why the DRP needs to be written to meet it.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1330 Week 5 Essay Assignment Active Directory Developing a backup strategy for Active Directory requires planning and preparation. There are two options to choose from within Windows Server 2008. The first option is the Graphical User Interface (GUI) requires you to install the Windows Server Backup feature from the Server Manager console. The second option is the Command Line Interface (CLI) which requires you to install Windows PowerShell. I prefer using the GUI Server Manager console. This allows one to backup critical volumes such as the system volume, boot volume; volumes that host the SYSVOL share, Active Directory (AD) database Ntds.dit and log files. The backup schedule would run each night starting at midnight. By scheduling a backup plan to run after business hours, you reduce the risk of interfering with day to day business. I would schedule a full backup to run on Sundays with incremental backups Monday thru Saturday. I would also backup System State data after major configuration changes. This would allow restoring changes if needed. Windows Server Backup does not allow for a single file to be backed up. The volume hosting the file must be backed up. Restoring Active Directory (AD) using normal replication provides fault tolerance. If one domain controller fails and requires a fresh OS installation, AD can be reinstalled using the dcpromo tool. Next you would allow replication from other domain controllers to repopulate the AD database. When a single domain controller needs to be restored, I would use the wbadmin utility to perform a nonauthoritive restore of AD. This would restore the domain controller to a state before the backup. In the event of an administrative error such as deleting multiple users from a OU, an authoritative restore would be performed using the Ntdsutil utility. This would correct administrative errors that have been replicated to all domain controllers in the domain.…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    c. Make Reliability a Reality: Use data warehouse to analysis the most valuable customers and provide other services such as Elite Access, Elite upgrade monitoring to achieve customer satisfication.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    QUESTION NO: 2 DRAG DROP You work as a database administrator at ABC.com. ABC.com is using a SQL Server 2008 instance that contains a database named ABC_DB1. As part of your backup method of ABC_DB1, you do a Full backup every Sunday at 01:00, you do a differential backup weekdays at 22:00, and you do transactional log backup weekdays at 08:00; 12:00 and 16:00. You have received notification that the user database data files have failed on Thursday at 15:00. You need to ensure that ABC_DB1 are retrieve as quickly as possible with as small as possible amount of data loss. What steps should you take? Use only steps that apply.…

    • 23466 Words
    • 94 Pages
    Good Essays
  • Good Essays

    Normally people never think of taking precautionary measures until they experience individual loss or feel the bitterness of unexpected disasters. This may also happen in most of the cases regarding back up processes against possible risks involved in information loss. There is no use of running after the data, which has already been a lost or taking bleak effort to regain it. But one has to be vigilant regarding the backup process by learning from the drastic experiences of others. If one realize about the importance of information stored in the system and feel the perspiration to create and process the data associated with it, he will never let it go by silly causes. Firstly he would concern about the protection of information by all possible ways. This short report reveals about the possible risks involved in data loss and the ways to eliminating those risks.…

    • 754 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The first component of a backup and recovery system is the scheduling of the backups, coupled with the storage of these backups. The most common schedule is a daily onsite incremental or…

    • 1311 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    12. The typical contents of a records disaster prevention and recovery manual outline usually consists of nine parts. The first part is the introduction; the title page, preface, and table of contents are included in this. Also the overall policy for the disaster avoidance is in here. Everyone who participated in the program and making of the manual is mentioned. Part two explains methods on how to prevent or decrease the effects of a disaster. Part three is the initial response which describes what to do, where to go, and who to contact during the first few hours after a disaster occurs. Part four is the assessment through narrative and photographs of the disaster site for insurance purposes. Part five is stabilization which helps employees to prevent further damage of business assets and services. It also describes how to remove records from the disaster site to the recovery site. Part six is interim processing which describes alternative procedures implemented during the period between disruption and return to normal operations. Part seven is recovery and restoration which is how to recover and restore the organizations records. Part eight is the relocation of the records to a new area. Part nine is the summary of responsibilities which is a recap of everything that has happened. This is used as an aid for new employees as a check-list to prevent further disasters. The format of the manual is always subject to change so the easiest thing to do is keep it in loose-leaf format in case of paper copies being…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wizzy Kalifa

    • 451 Words
    • 2 Pages

    2. If you have any data that you’d like to backup for safe-keeping, then this would be the best time to handle that.…

    • 451 Words
    • 2 Pages
    Good Essays