Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SecurityCHPT13

terms

QuestionAnswer
business continuity ability of an organization to maintain its operation and services in the face of a disruptive event
bia business impact analysis
bia analyzes the most important mission critical business functions
bia identifying threats thru a risk assessment
disaster recovery plan IT contingency planning
mttr mean time to restore
mttr average time needed to reestablish services to their previous condition
drp disaster recovery plan
drp written document that details the process for restoring IT resources following an event that causes a significant disruption in service
unit 1 purpose and scope
unit 2 recovery team
unit 3 preparing for a disaster
unit 4 emergency procedures
unit 5 restoration procedures
backout contingency option the plan is put into place but does not appear to be working properly
single point of failure a component in a system,if no longer functions,will disable the entire system
high availability a system that can function for an extended period of time with little downtime
sla service level agreement
redundant servers refers to the practice of having a secondary computer system or network device that will take over when the primary server fails.
server cluster a combination of two or more servers that appear to be as one
symmetric server cluster every server in the cluster performs useful work and if one server fails the remaining servers continue to perform their normal work
asymmetric server cluster a technology exists in which a standby server exits only to take over for another server in event of a failure
two types of server clusters asymmetric symmetric
asymmetric server cluster are used to provide high availability applications that require a high level of read and write action
symmetric cluster every server in the cluster performs useful work
mtbf mean time between failures
mtbf refers to the average time until a component fails cannot be repaired and must be replaced
total time measured divided by the total number of failures observed calculating the mtbf
mtbf rating used to determine the number of spare hard drives that should be stored
raid redundant array of independent disks
raid level 0 striped disk array withoutr fault tolerance
raid level 1 mirroring
raid level 5 independent disks with distributed parity
raid level 0+1 high data transfer
raid level 0 minimum number of drives needed 2
raid level 1 minimum number of drives needed 2
raid level 5 minimum number of drives needed 3
raid level 0+1 minimum number of drives needed 4
raid level 1 data written twice to seperate drives
raid level 0+1 a mirrored array whose segments are riad 0 arrays
raid level 0 uses a striped disk array so that data is broken down into blocks and each block is written to a seperate disk drive
raid level 5 each entire data block is written on a data disk and parity for blocks in the same rank is generated and recorded on a seperate disk
hot site a duplicate of the production site and has all the equipment needed for an organization to continue running
cold site provides office space but the customer must provide equipment to continue running
warm site has equipment installed but not have active internet does not keep backups
data backup copying info to another medium and storing it offsite
backup software can internally designate which software needs to be backed up
archive bit any time the backup file is changed the bit is set to one
full backup starting point for all backups
differential backup back up any data that has changed since last backup
incremental backup back up any data that has changed since last full or incremental backup
rto recovery time objective
rto maximum length of time a that an organization can tolerate between backups
rto recovery time objective
rto length of time it takes to recover the data that has been backed up
d2d2t disk to disk disk to tape
d2d2t uses the magnetic disk as a tempoary storage area
cdp continuous data protection
cdp performs continuous data backups that can be restored immediately
cdp maintains a historical record of all the changes made to data by constantly monitoring all writes to the hard drive
block level cdp entire volume protected
file level cdp individual files protected
application level cdp individual application changes protected
magnetic tape good for high capacity backups
disk to disk hard drive may be subject to failure
disk to disk to tape good compromise of tape and disk to disk
continuous data protection for organizations that can not afford down time
in order to a fire to occur you need fuel
in order to a fire to occur you need oxygen
in order to a fire to occur you need heat
in order to a fire to occur you need chemical reaction
fires are divided into five categories class a
fires are divided into five categories class b
fires are divided into five categories class c
fires are divided into five categories class d
fires are divided into five categories class k
water sprinkler systems spray the area with pressurized water
dry chemical systems disperse a fine powder over the fire
clean agent systems do not harm people,documents or electrical equipment in the room
van eck phreaking form of eavesdropping in which special equipment is used to pick up telecommunication signals or data whichin a computer device by monitoring electromagnetic fields
faraday cage metallic enclosure that prevents the entry or escape of an electromagnetic field
hot aisle cold aisle layout server racks are lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing another
plenums air handling space above drop ceilings
incident response procedures include using forensic science and properly responding to a computer forensics event by using forensics procedures
computer forensics uses technology to search for computer evidence of a crime
importance of computer forensics amount of digital evidence
importance of computer forensics increased scruntiny by the legal profession
importance of computer forensics higher level of computer skills by criminals
four basic steps in forensics secure the crime scene
four basic steps in forensics collect the evidence
four basic steps in forensics establish a chain of custody
four basic steps in forensics examine the evidence
order of volatility different data sources have different degrees of preservation
system image snapshot of the current state of the computer that contains all current setings and data
mirror image bitstream backup
mirror image replicates all sectors of a computer hard drive,including all files and any hidden data storage area
chain of custody documents that the evidence was under strict control at all times and no one messed with it
page file a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
page file used by Windows to hold temporary data which is swapped in and out of physical memory in order to provide a larger virtual memory set.
slack The space between the end of a file and the end of the disk cluster it is stored in
ram slack can contain any information that has been creaed,viewed,modified,downloaded,or copied since the computer was last booted
file slack it occurs naturally because data rarely fill fixed storage locations exactly, and residual data occur when a smaller file is written into the same cluster as a previous larger file.
metadata
Created by: cgeaski