click below
click below
Normal Size Small Size show me how
5/16/13 WD2 SA
| Question | Answer |
|---|---|
| Hacker | an unauthorized user who penetrates a host or network to access and manipulate data |
| BYOD policy | a plan implemented to manage employee personal mobile devices on a company network |
| mobile device management (MDM) | The process of managing a BYOD network using various tools |
| hypervisor | A single piece of hardware that runs multiple operating systems such as a server that uses visualization software to run windows and Linux OS concurrently |
| continuous data protection (CDP) | A backup technique that saves every change made to a computer data it allows data restores at any point in time |
| recovery time objective (RTO) | The length of time a system can be offline before the business is affected |