Chapter 13 Develop A Storage Security Policy Exam Prep - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.

Chapter 13 Develop A Storage Security Policy Exam Prep

Linux Essentials for Cybersecurity (Rothwell/Kinsey)

Chapter 13 Develop a Storage Security Policy

1) Which of the following is not recommended when developing a security plan for storage devices?

A) A database with private company data should be stored in an external-facing web server.

B) Sensitive data needs to be secure from prying eyes, including users who have valid access to the system.

C) A data recovery system should be put in place to allow for the quick recovery of lost data.

D) All critical data needs to be backed up on a regular basis in the event that a storage device fails or a disaster (such as fire or flood) destroys the storage devices.

2) Who is responsible for developing a solid strategy for backing up an organization’s data?

A) End user

B) System administrator

C) CEO

D) President

3) Which of the following refers to a backup that is performed only on the files that have changed since a previous backup?

A) Full backup

B) Intermittent backup

C) Incremental backup

D) Standard backup

4) Which of the following directories to consider including in a backup strategy rarely changes because this is the location of most of the system’s commands, documentation, and programs?

A) /bin

B) /usr

C) /var

D) /boot

5) Which of the following directories to consider including in a backup strategy contains third-party software installed on the system?

A) /opt

B) /sbin

C) /home

D) /etc

6) Which of the following directories either are not stored on the hard drive or contain temporary information that never needs to be backed up?

A) /etc

B) /lib

C) /bin

D) /proc

7) Which of the following is not true regarding how often you should perform backups?

A) Backups typically use a different schedule for different directories.

B) There is no exact rule that tells you how often to perform backups.

C) Backups should always be performed on a daily basis.

D) Backups can be scheduled based on how often data changes in each directory.

8) According to the text example, which of the following levels is associated with a full backup?

A) Level 0

B) Level 1

C) Level 2

D) Level 3

9) Which backup strategy is based on a mathematical puzzle game?

A) Bacula

B) Tower of Hanoi

C) Amanda

D) None of the above

10) The “3-2-1 Rule” for backups states that you should store three copies of all important backup data, use at least two types of media for the backups, and make sure at least one backup is kept __________.

A) onsite

B) hidden

C) online

D) offsite

11) Which of the following backup storage locations offers the advantages of low cost and medium shelf life, but requires a lot of maintenance?

A) Remote

B) Disk

C) Tape

D) Optical media

12) Which of the following backup storage locations is fast and easily available, but is not portable?

A) Remote

B) Disk

C) Tape

D) Optical media

13) Which of the following backup storage locations depends on network access and could be expensive and slow?

A) Remote

B) Disk

C) Tape

D) Optical media

14) Which of the following backup storage locations offers decent speed and low cost, but low storage capacity?

A) Remote

B) Disk

C) Tape

D) Optical media

15) Which of the following commands is useful for backing up entire devices, whether entire hard disks, individual partitions, or logical volumes?

A) tar

B) rsync

C) dd

D) cpio

16) Which of the following commands was originally designed to back up filesystems to tape devices, and can now also be used to back up to non-tape devices?

A) tar

B) rsync

C) dd

D) cpio

17) Which of the following commands is designed to back up files to a remote system and can communicate via Secure Shell (SSH), making the backup process secure?

A) tar

B) rsync

C) dd

D) cpio

18) Which of the following is a third-party backup utility that is an open source software tool popular on both Unix and Linux distributions?

A) Bacula

B) Tower of Hanoi

C) Amanda

D) gzip

19) Which of the following is a third-party backup utility that supports clients from different platforms, including Linux, Microsoft Windows, macOS, and Unix?

A) Amanda

B) bzip2

C) Tower of Hanoi

D) Bacula

20) Which of the following options for the tar command is used to create a tar ball?

A) -c

B) -t

C) -C

D) -z

Document Information

Document Type:
DOCX
Chapter Number:
13
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 13 Develop A Storage Security Policy
Author:
William Rothwell

Connected Book

Answer Key + Test Bank | Linux Essentials 1e Rothwell

By William Rothwell

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party