Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
29 Cards in this Set
- Front
- Back
refers to the process of keeping services and systems operational during an outage.
|
High availability
|
|
refers to systems that are either duplicated or that fail over to other systems in the event of a malfunction.
|
Redundancy
|
|
is primarily the ability of a system to sustain operations in the event of a component failure.
|
Fault tolerance.
|
|
the ability to recover system operations after a disaster. Designing a comprehensive backup plan that includes backup storage, procedures, and maintenance
|
Disaster Recovery
|
|
are duplicate copies of key information, ideally stored in location other than the one where the informaiton is currently stored.
|
Back ups
|
|
sometimes referred to as shadow copies - are partial or full backups that are kept at the computer center for immediate recovery purposes.
|
working copies
|
|
usually refers to a location on the site of the computer center that is used to store information locally. It is designed and rated for fire, moisture, and pressure resistance.
|
Onsite storage
|
|
refers to a location away from the computer center where paper copies and backup media are kept.
|
offsite storage
|
|
helps an organization respond effectively when a disaster occurs.
|
disaster recovery plan
|
|
is a complete, comprehensive backup of all files on a disk or server.
|
full backup
|
|
is a partial backup that stores only the information that has been changed since the last full or the last incremental backup.
|
incremental backup
|
|
backs up any files that have been altered since the last full backup
|
differential backup
|
|
works on assumption that any information created on any system is stored forever.
|
full archived method
|
|
establishes a server that with large amounts of disk space whose sole purpose is to back up data.
|
Backup server method
|
|
is a location that can provide operations within hours of a failure. This type of site would have servers networks and telecommunications equipment in place to reestablish service in a short time.
|
hot site
|
|
requires the customer to do more work to become operational. it provide computer systems and compatible media capabilities.
|
warm site
|
|
is a facility that isn't immediately ready to use. It may provide a place for operations to resume, but it doesn't really provide the infrastructure to support those operations.
|
cold site
|
|
is an agreement between you or your company and a service provider
|
Service level Agreements
|
|
is the measure of the anticipated incidence of failure for a system or component.
|
Mean time between failure(MTBF)
|
|
is the measurement of how long it takes to repair a system or component once a failure occurs
|
Mean time to repair(MTTR)
|
|
refers to the storage and conditions of release of source code provided by a vendor.
|
Code escrow
|
|
deal primarily with computers and information provided by the company.
|
acceptable use policy (AUP)
|
|
are designed to reduce the risk of fraud and prevent other losses in an organization. It helps prevent an individual from embezzling money from a company.
|
separation of duties policies
|
|
the level of care used to maintain the confidentiality of private information. These policy specifies how information should be handled.
|
due care policies
|
|
refer to the authorization of individuals to access facilities or systems that contain information
|
physical access control policy
|
|
involves making decisions about what information is accessed, how it's accessed, and who is authorized to access it.
|
Privilege management
|
|
is the process of increasing permissions. Often it is done temporarily and innocently, but it can also be accomplished by exploiting local vulnerabilities.
|
privilege escalation
|
|
is the process of ensuring that policies, procedures and regulations are carried out in a manner consistent with organization standards
|
auditing
|
|
verify that accounts, groups, and roles are correctly assigned and that policies are being followed.
|
privilege auditing
|