Term
What is the central theme of effective Operations Security? |
|
Definition
|
|
Term
__________ is a backup that creates a byte-by-byte copy |
|
Definition
|
|
Term
___________ copies the entire hard disk including the operating system and installed applications. |
|
Definition
|
|
Term
__________ is the replication of data to separate disks in real time. |
|
Definition
|
|
Term
__________ is the bulk transfer of backup data over communications facilities. |
|
Definition
|
|
Term
___________ delivers real-time database data by capturing and transmitting the journal and transaction log offsite as they are created. |
|
Definition
|
|
Term
_____________ reduces recovery time by using a database restore and roll-forward process. |
|
Definition
|
|
Term
____________ keep idle servers available for failover. |
|
Definition
|
|
Term
______________ provide recovery of most critical applications in a matter of minutes through guaranteed access to an alternate processor. |
|
Definition
|
|
Term
What are the three backup storage location options? |
|
Definition
Onsite, offsite, and near-site |
|
|
Term
A __________ is a pre-installed drive that can immediately replace a failed drive. |
|
Definition
|
|
Term
A _______________ is a backup for any disk in the array that fails. |
|
Definition
|
|
Term
A __________ is a backup for a specific disk in the array. |
|
Definition
|
|
Term
__________ stores data across several disks allowing for a faster read and write speed. |
|
Definition
|
|
Term
Which RAID level consists of Striping only? |
|
Definition
|
|
Term
Which RAID Level employs mirrored disks? |
|
Definition
|
|
Term
Which RAID level uses one drive for parity and features byte level parity? |
|
Definition
|
|
Term
Which RAID level uses one drive for parity and features block level parity? |
|
Definition
|
|
Term
Which RAID level employs block level stripes and parity interleaved across all drives and is the most popular RAID implementation? |
|
Definition
|
|
Term
The main difference between RAID 5 and 6 is fault tolerance. Which is more tolerant? |
|
Definition
|
|
Term
_____________ mandates that changes must be approved, documented, and made via an authorized process. |
|
Definition
|
|
Term
___________ is the methodical application of vendor-related updates and security enhancements. |
|
Definition
|
|
Term
__________ ensures that all team members are using compatible products and ones that have the latest security updates applied. |
|
Definition
|
|
Term
What are the three types of trusted recovery? |
|
Definition
System Reboot, Emergency System Restart, and System Cold Start |
|
|
Term
_____________ is a system failure where secure conditions are maintained. |
|
Definition
|
|
Term
______________ is a system failure where the system permits traffic in the event of a failure. |
|
Definition
|
|
Term
_________ is a system that upon failure will cause no harm. |
|
Definition
|
|
Term
What are the three types of standby systems? |
|
Definition
|
|
Term
What are the six parts of a media management process? |
|
Definition
Marking, Labeling, Handling, Storing, Declassifying, and destroying |
|
|
Term
Due to a software bug and a reload of the firewall, the firewall has lost its complete configuration. After that happened, all firewall ports shut down. This is known as ___________. |
|
Definition
|
|
Term
What is the best way to control users with elevated system privileges? |
|
Definition
|
|
Term
Which RAID configuration offers the usable disk storage as the sum of all disk capacities? |
|
Definition
|
|
Term
Which RAID configuration offers the lowest cost of redundancy? |
|
Definition
|
|
Term
+92Security administrator responsibilities include reviewing audit log data, setting access permissions, conducting vulnerability assessments, and _________. |
|
Definition
Setting File-sensitivity labels |
|
|
Term
Media Management practices include media marking, labeling, handling, storing, ______________________. |
|
Definition
Declassifying and destroying |
|
|
Term
Which backup type is the replication of data on separate disks in real time? |
|
Definition
|
|
Term
A _________ is a set of disk drives connected to a separate optical network for the use of servers. |
|
Definition
|
|
Term
Configuring traffic priority controls on devices is the responsibility of the _____________. |
|
Definition
|
|
Term
Backup integrity is assured with __________. |
|
Definition
|
|
Term
A hot spare in a RAID array that is a backup for a specific disk in the array is called a _____________. |
|
Definition
|
|
Term
Ensuring availability of data is the responsibility of the ________________. |
|
Definition
|
|
Term
A review of an operator's shift logs can be identified as which type of control? |
|
Definition
|
|
Term
What are the four types of controls? |
|
Definition
Preventative, Detective, Recovery, and Deterrent |
|
|
Term
A group of disks connected to the same network, used by all clients and servers is known as a ____________ |
|
Definition
|
|
Term
What is the most secure way to dispose of a CD-RW? |
|
Definition
|
|
Term
Change control procedures include request, impact, assessment, approval, build and test, and _______________. |
|
Definition
|
|