click below
click below
Normal Size Small Size show me how
5/16/13 WD2 SA
Question | Answer |
---|---|
Hacker | an unauthorized user who penetrates a host or network to access and manipulate data |
BYOD policy | a plan implemented to manage employee personal mobile devices on a company network |
mobile device management (MDM) | The process of managing a BYOD network using various tools |
hypervisor | A single piece of hardware that runs multiple operating systems such as a server that uses visualization software to run windows and Linux OS concurrently |
continuous data protection (CDP) | A backup technique that saves every change made to a computer data it allows data restores at any point in time |
recovery time objective (RTO) | The length of time a system can be offline before the business is affected |