STUDY GUIDE

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

full backup

As its name implies, this backup copies everything to a backup media. It is usually tape, but is sometimes CD, DVD, or disk

differential backup

With this type of backup, you start by making a full backup, perhaps on Sunday, when network traffic is lightest. On Monday through Saturday, you back up changes made since Sunday's full backup on a daily basis. As the week progresses, each night's backup takes a little longer.

rogue wireless access points

installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.

code review

systematic examination (sometimes referred to as peer review) of computer source code. It is intended to find mistakes overlooked in software development, improving the overall quality of software.

network segmentation

the act or practice of splitting a computer network in subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security.

recovery time objective

the timeframe for restoring a CBF. Must be shorter than or equal to the MTD.

business impact analysis

- determines the extent of the impact that a particular incident would have on business operations over time. - drives the choice of the recovery strategy and the critical business functions. - conduct for three key reasons: 1. To set the value of each business unit or resource as it relates to how the entire organization operates 2. To identify the critical needs to develop a business recovery plan 3. To set the order or priority for restoring the organization's functions after a disruption

WEP

1. Legacy encryption for wireless networks. Weak and does not provide sufficient protection for most traffic. 2. Intention was to provide data confidentiality comparable to that of a traditional wired network

production data

1. data that is essential to completing day-to-day business tasks and processes. 2. must be readily available for frequent and efficient access and is stored persistently. It is therefore often stored on high-performing Tier-1 storage that can be easily managed.

remote journaling

System writes a log of online transactions to an offsite location

encryption

The act of transforming cleartext data into undecipherable ciphertext

test data

data which has been specifically identified for use in tests, typically of a computer program. Some data may be used in a confirmatory way, typically to verify that a given set of input to a given function produces some expected result

high availability firewall

deployment in which two firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network. - provides redundancy and allows you to ensure business continuity.

recovery point objective

maximum acceptable level of data loss after a disaster.

incident response plan

must outline the steps that must be taken to stop the spread of the incident without causing unnecessary outage. • For example, if a virus infects a system, a simple way to contain the threat is to unplug the system from the network.

business continuity plan

plan that contains the actions needed to keep critical business processes running after a disruption

incremental backup

start with a full backup when network traffic is light. Then, each night, you back up only that day's changes. As the week progresses, the nightly backup takes about the same amount of time.

wireless encryption

two main types: WPA and WEP - WPA2 is strongest makes it impossible for an outsider to view information traveling over the network.

disk backup

types: - Storage are network (SAN) - Network attached server (NAS)

disaster recovery plan

• A written plan for how to handle major disasters or outages and recover mission-critical systems, applications, and data

separation of duties

• Breaks a task into subtasks that different users must carry out • achieved by disseminating the tasks and associated privileges for a specific security process among multiple people. • Means a single user cannot carry out a critical task without the help or approval of another user.

computer based training

• Involves the use of a personal or networked computer for the delivery and access of training programs. • Can be synchronous and asynchronous, as well as online, web-based, mobile, and distance learning. • Particularly usefule when training learners on a specific computer application, but can also be built to train learners on general knowledge or skills. • Greatest disadvantage is that it is expensive to develop and deliver, especially for smaller groups of students • Can be more cost efficient when designed to train a larger number of students


संबंधित स्टडी सेट्स

Advanced Contract Law (WA Real Estate Continuing Education 2021)

View Set

Chapter 5 Intermediate Accounting: Questions

View Set

study guide for the test on thrusday on Unit 6

View Set

SS Option C1 Hypokinetic Disease

View Set