Intrusion Detection Chapter 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Database shadowing techniques are generally used in organizations that do not need immediate data recovery after an incident or disaster.

False

For recovery from an incident (as opposed to a disaster), archives are used as the most common solution.

False

____ uses a number of hard drives to store information across multiple drive units.

RAID

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

SaaS

One real-time protection and data backup strategy is the use of mirroring.

True

RAID is an acronym for Redundant Array of Incident-Recovery Drives.

True

Some data is required by law to be retained and stored for years.

True

A(n) ____ is an agreement in which the client agrees not to use the vendor's services to compete directly with the vendor, and for the client not to use vendor information to gain a better deal with another vendor.

covenant not to compete

____ are used for recovery from disasters that threaten on-site backups.

data archives

RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which data segments are written in turn to each disk drive in the array.

disk striping

An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.

disk-to-disk-to-cloud

A resumption location known as a ____ or a _______ is a fully configured computer facility capable of establishing operations at a moment's notice.

hot site, mirrored site

A ____ is a synonym for a virtualization application.

hypervisor

A(n) ____ backup only archives the files that have been modified since the last backup.

incremental

A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization.

moderate

A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and communications methods to provide an online storage environment.

network-attached storage

A(n) ____ covers the confidentiality of information from everyone unless disclosure is mandated by the courts.

nondisclosure agreement

Considered to be the traditional "lock and copy" approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive.

online backup applications

A(n) ____ is an extension of an organization's intranet into cloud computing.

private cloud

Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and the duration of storage.

retention

Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing backups of data.

robustness

A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.

service agreement

A ____ is an agency that provides physical facilities in the event of a disaster for a fee.

service bureau

A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.

statement of indemnification

A potential disadvantage of a ____ site-resumption strategy is that more than one organization might need the facility simultaneously.

time-share

When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or on a host platform.

virtual machine


संबंधित स्टडी सेट्स

Psyc Chapter 5, psych ch. 5-8, test 2

View Set

Hemodialysis & Peritoneal Dialysis qs

View Set

Management of Patients With Musculoskeletal Disorders

View Set