• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/29

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

29 Cards in this Set

  • Front
  • Back
refers to the process of keeping services and systems operational during an outage.
High availability
refers to systems that are either duplicated or that fail over to other systems in the event of a malfunction.
Redundancy
is primarily the ability of a system to sustain operations in the event of a component failure.
Fault tolerance.
the ability to recover system operations after a disaster. Designing a comprehensive backup plan that includes backup storage, procedures, and maintenance
Disaster Recovery
are duplicate copies of key information, ideally stored in location other than the one where the informaiton is currently stored.
Back ups
sometimes referred to as shadow copies - are partial or full backups that are kept at the computer center for immediate recovery purposes.
working copies
usually refers to a location on the site of the computer center that is used to store information locally. It is designed and rated for fire, moisture, and pressure resistance.
Onsite storage
refers to a location away from the computer center where paper copies and backup media are kept.
offsite storage
helps an organization respond effectively when a disaster occurs.
disaster recovery plan
is a complete, comprehensive backup of all files on a disk or server.
full backup
is a partial backup that stores only the information that has been changed since the last full or the last incremental backup.
incremental backup
backs up any files that have been altered since the last full backup
differential backup
works on assumption that any information created on any system is stored forever.
full archived method
establishes a server that with large amounts of disk space whose sole purpose is to back up data.
Backup server method
is a location that can provide operations within hours of a failure. This type of site would have servers networks and telecommunications equipment in place to reestablish service in a short time.
hot site
requires the customer to do more work to become operational. it provide computer systems and compatible media capabilities.
warm site
is a facility that isn't immediately ready to use. It may provide a place for operations to resume, but it doesn't really provide the infrastructure to support those operations.
cold site
is an agreement between you or your company and a service provider
Service level Agreements
is the measure of the anticipated incidence of failure for a system or component.
Mean time between failure(MTBF)
is the measurement of how long it takes to repair a system or component once a failure occurs
Mean time to repair(MTTR)
refers to the storage and conditions of release of source code provided by a vendor.
Code escrow
deal primarily with computers and information provided by the company.
acceptable use policy (AUP)
are designed to reduce the risk of fraud and prevent other losses in an organization. It helps prevent an individual from embezzling money from a company.
separation of duties policies
the level of care used to maintain the confidentiality of private information. These policy specifies how information should be handled.
due care policies
refer to the authorization of individuals to access facilities or systems that contain information
physical access control policy
involves making decisions about what information is accessed, how it's accessed, and who is authorized to access it.
Privilege management
is the process of increasing permissions. Often it is done temporarily and innocently, but it can also be accomplished by exploiting local vulnerabilities.
privilege escalation
is the process of ensuring that policies, procedures and regulations are carried out in a manner consistent with organization standards
auditing
verify that accounts, groups, and roles are correctly assigned and that policies are being followed.
privilege auditing