• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/3

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

3 Cards in this Set

  • Front
  • Back
Visit :
www.hwguiders.com
CMGT 244
Intro to IT Security

What is the difference between a DRP and a BCP?
What is the purpose of a Disaster Recovery Plan (DRP)?
What are the key elements of a DRP?
What are the five methods of testing a DRP?
Why does a DRP require testing?
Establishing a Secure Computer Room
Explain the seven layers of the OSI model in detail
At which layers do packet-filtering routers and firewalls reside? And how do pack-filtering routers and firewalls protect a network?
Explain the concept of cryptography. What are the various types of cryptography? Summarize the mechanisms that make up a strong cryptosystem and how the cryptosystem could be used to secure a system.
Information Security Policy,
All DQs Included
Visit :
www.hwguiders.com
CMGT 244
Intro to IT Security

What is the difference between a DRP and a BCP?
What is the purpose of a Disaster Recovery Plan (DRP)?
What are the key elements of a DRP?
What are the five methods of testing a DRP?
Why does a DRP require testing?
Establishing a Secure Computer Room
Explain the seven layers of the OSI model in detail
At which layers do packet-filtering routers and firewalls reside? And how do pack-filtering routers and firewalls protect a network?
Explain the concept of cryptography. What are the various types of cryptography? Summarize the mechanisms that make up a strong cryptosystem and how the cryptosystem could be used to secure a system.
Information Security Policy,
All DQs Included
Visit :
www.hwguiders.com
CMGT 244
Intro to IT Security

What is the difference between a DRP and a BCP?
What is the purpose of a Disaster Recovery Plan (DRP)?
What are the key elements of a DRP?
What are the five methods of testing a DRP?
Why does a DRP require testing?
Establishing a Secure Computer Room
Explain the seven layers of the OSI model in detail
At which layers do packet-filtering routers and firewalls reside? And how do pack-filtering routers and firewalls protect a network?
Explain the concept of cryptography. What are the various types of cryptography? Summarize the mechanisms that make up a strong cryptosystem and how the cryptosystem could be used to secure a system.
Information Security Policy,
All DQs Included