0% found this document useful (0 votes)
7 views

Lab 9

This is examples

Uploaded by

phucdnse180322
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Lab 9

This is examples

Uploaded by

phucdnse180322
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Lab #9: Assessment Worksheet

Develop Disaster Recovery Back-up Procedures and Recovery


Instructions

Course Name: IAA202

Student Name: DUONG NGOC PHUC

Instructor Name: DINHMH

Lab Due Date: 30.10.2024

Overview
The most important task for a business continuity and disaster recovery plan is to
document all identifiedmission critical IT systems, applications, and data recovery
procedures. Fast recovery times for IT systems and applications are achievable with
efficient and accurate recovery instructions. This lab has thestudents apply the same
concepts of disaster recovery back-up procedures and recovery instructions to their own
data.

Lab Assessment Questions


1. How does documented back-up and recovery procedures help achieve RTO?
By having effective backup and recovery procedures you should have the necessary
resources to restore systems from backups and a repeatable process that is known to
succeed in achieving RTO. By documenting and implementing backup and recovery
procedures, the process for recovery is much more efficient, helping with the
time portion of RTO.

2. True or False. To achieve an RTO of 0, you need 100% redundant, hot-stand-by


infrastructure (i.e.,IT system, application, and data, etc.).
True, we need 100% redundant, hot-stand-by infrastructure because when the system
fails we can immediately operate the backup system with similar function while
waiting for the main system to be repaired.

3. What is most important when considering data back-up?


- The most important areas to consider are :
+ Registry: because Registry is a database used to store Windows specifications and
store information about changes, choices and settings from Windows users.
+ Directories: to know which folders are important to prioritize early backup when
something goes wrong
+ Imperative operating data as well as licensing: to assign the right
administrative privileges

4. What is most important when considering data recovery?


The most important when considering data recovery: Most current progress, working
recovery and in a timely manner because these will help the organization reduce the
damage suffered to a minimum.

5. What are the risks of using your external e-mail box as a back-up and data storage
solution?
+ If it is a large recovery you may not be able to have internet access to download it.
File corruption could be an issue as well as back up size allowable for email.
+ Difficult to manage because it is easy for the enemy to steal backups.
6. Identify the Total Amount of Time Required to Recover and Install the Lab #9
Assessment Worksheets on Your Student VM Hard Drive and open the file in
Microsoft Word to verify integrity.
{Insert your timed RTO using your computer clock – following your documented
instructions andsteps}.

7. Did you achieve your RTO? What steps and procedures can you implement to help
drive RTO evenlower?
I am assuming from the lab, steps that would be with better equipment , a Hot-Site
and lots of money.

8. What are some recommendations for lowering the RTO for retrieval and access to
the back-up datafile?
Have a good recovery system , the recovery software could be as low as 15 min , with
some products . Making sure they are available and tested regularly.

9. If you drive RTO lower what must you do to streamline the procedure?
It is absolutely necessary to continuously test the procedure to ensure its better to use .

10. Why is documenting and testing critical to achieve a defined RTO?


In documentation you will document how much each time each task takes which will
help in determining the RTO.

11. Why is it a best practice for an organization to document its back-up and recovery steps
for DR?
Because a company wants to get up and running as soon as possible, it must have a
scenario to recover data in a specific step to avoid major damage.

12. What can you do to cut down on the recovery time for accessing, copying, and
recovering your Lab#1 – Lab #8 individual worksheets to help achieve the RTO?
Utilize incremental backups instead of full backups, prioritize critical data for faster
retrieval, leverage compression and deduplication techniques to reduce data size and
transfer times, and ensure that backup storage locations are easily accessible
13. What will encryption of a disk or data in storage do to the RTO definition when
attempting to retrieveand recover clear-text data for production use?
The Disaster Recovery team should have access to any key needed to
unencrypt/decipher the data stored. The issue of file corruption could potentially
come into play depending on the level of damage and disaster as well as the
recovery site and it’s stability after the disaster has occurred. There should be no
other issues beyond this.

14. How many total steps did your back-up and recovery procedures consist of for this
Lab exercise? Arethere any that can be combined or streamlined?
So we take total 7 steps for backup 3 recovery procedures consist of lab exercise.

15. If the individual accessing the system for DR purposes was not familiar with
the IT system and required system administrator login credentials, what
additional step is required in the recoveryphase?
The individual can either contact the Administrator to avail the
credentials for the moment, with simultaneous authorizations secured from
the relevant authorities to log into the system for disaster recovery purpose;
or look for the Data recovery document Plan if it has been stored in a place
that the individual has been already briefed of, to seek the guidance for the
steps to recover the data from the same.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy