Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SecurityCHPT13

terms

QuestionAnswer
business continuity ability of an organization to maintain its operation and services in the face of a disruptive event
bia business impact analysis
bia analyzes the most important mission critical business functions
bia identifying threats thru a risk assessment
disaster recovery plan IT contingency planning
mttr mean time to restore
mttr average time needed to reestablish services to their previous condition
drp disaster recovery plan
drp written document that details the process for restoring IT resources following an event that causes a significant disruption in service
unit 1 purpose and scope
unit 2 recovery team
unit 3 preparing for a disaster
unit 4 emergency procedures
unit 5 restoration procedures
backout contingency option the plan is put into place but does not appear to be working properly
single point of failure a component in a system,if no longer functions,will disable the entire system
high availability a system that can function for an extended period of time with little downtime
sla service level agreement
redundant servers refers to the practice of having a secondary computer system or network device that will take over when the primary server fails.
server cluster a combination of two or more servers that appear to be as one
symmetric server cluster every server in the cluster performs useful work and if one server fails the remaining servers continue to perform their normal work
asymmetric server cluster a technology exists in which a standby server exits only to take over for another server in event of a failure
two types of server clusters asymmetric symmetric
asymmetric server cluster are used to provide high availability applications that require a high level of read and write action
symmetric cluster every server in the cluster performs useful work
mtbf mean time between failures
mtbf refers to the average time until a component fails cannot be repaired and must be replaced
total time measured divided by the total number of failures observed calculating the mtbf
mtbf rating used to determine the number of spare hard drives that should be stored
raid redundant array of independent disks
raid level 0 striped disk array withoutr fault tolerance
raid level 1 mirroring
raid level 5 independent disks with distributed parity
raid level 0+1 high data transfer
raid level 0 minimum number of drives needed 2
raid level 1 minimum number of drives needed 2
raid level 5 minimum number of drives needed 3
raid level 0+1 minimum number of drives needed 4
raid level 1 data written twice to seperate drives
raid level 0+1 a mirrored array whose segments are riad 0 arrays
raid level 0 uses a striped disk array so that data is broken down into blocks and each block is written to a seperate disk drive
raid level 5 each entire data block is written on a data disk and parity for blocks in the same rank is generated and recorded on a seperate disk
hot site a duplicate of the production site and has all the equipment needed for an organization to continue running
cold site provides office space but the customer must provide equipment to continue running
warm site has equipment installed but not have active internet does not keep backups
data backup copying info to another medium and storing it offsite
backup software can internally designate which software needs to be backed up
archive bit any time the backup file is changed the bit is set to one
full backup starting point for all backups
differential backup back up any data that has changed since last backup
incremental backup back up any data that has changed since last full or incremental backup
rto recovery time objective
rto maximum length of time a that an organization can tolerate between backups
rto recovery time objective
rto length of time it takes to recover the data that has been backed up
d2d2t disk to disk disk to tape
d2d2t uses the magnetic disk as a tempoary storage area
cdp continuous data protection
cdp performs continuous data backups that can be restored immediately
cdp maintains a historical record of all the changes made to data by constantly monitoring all writes to the hard drive
block level cdp entire volume protected
file level cdp individual files protected
application level cdp individual application changes protected
magnetic tape good for high capacity backups
disk to disk hard drive may be subject to failure
disk to disk to tape good compromise of tape and disk to disk
continuous data protection for organizations that can not afford down time
in order to a fire to occur you need fuel
in order to a fire to occur you need oxygen
in order to a fire to occur you need heat
in order to a fire to occur you need chemical reaction
fires are divided into five categories class a
fires are divided into five categories class b
fires are divided into five categories class c
fires are divided into five categories class d
fires are divided into five categories class k
water sprinkler systems spray the area with pressurized water
dry chemical systems disperse a fine powder over the fire
clean agent systems do not harm people,documents or electrical equipment in the room
van eck phreaking form of eavesdropping in which special equipment is used to pick up telecommunication signals or data whichin a computer device by monitoring electromagnetic fields
faraday cage metallic enclosure that prevents the entry or escape of an electromagnetic field
hot aisle cold aisle layout server racks are lined up in alternating rows with cold air intakes facing one direction and hot air exhausts facing another
plenums air handling space above drop ceilings
incident response procedures include using forensic science and properly responding to a computer forensics event by using forensics procedures
computer forensics uses technology to search for computer evidence of a crime
importance of computer forensics amount of digital evidence
importance of computer forensics increased scruntiny by the legal profession
importance of computer forensics higher level of computer skills by criminals
four basic steps in forensics secure the crime scene
four basic steps in forensics collect the evidence
four basic steps in forensics establish a chain of custody
four basic steps in forensics examine the evidence
order of volatility different data sources have different degrees of preservation
system image snapshot of the current state of the computer that contains all current setings and data
mirror image bitstream backup
mirror image replicates all sectors of a computer hard drive,including all files and any hidden data storage area
chain of custody documents that the evidence was under strict control at all times and no one messed with it
page file a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
page file used by Windows to hold temporary data which is swapped in and out of physical memory in order to provide a larger virtual memory set.
slack The space between the end of a file and the end of the disk cluster it is stored in
ram slack can contain any information that has been creaed,viewed,modified,downloaded,or copied since the computer was last booted
file slack it occurs naturally because data rarely fill fixed storage locations exactly, and residual data occur when a smaller file is written into the same cluster as a previous larger file.
metadata
Created by: cgeaski
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards