2.5 Given a scenario, implement cybersecurity resilience. Flashcards

1
Q

The implementation of alternate means to perform work tasks or accomplish IT functions to support or maintain availability of a resource or service. Redundancy helps reduce single points of failure and improves fault tolerance.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ability of a network, system, or computer to withstand a certain level of failures, faults, or problems and continue to provide reliable service. Fault tolerance is also a form of avoiding single points of failure.

A

Fault Tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Redundancy is improved when this is used to place more physical distance between duplicate systems.

A

Geographic disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This high availability solution employs multiple hard drives in a single storage volume with some level of drive loss protection.

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An implementation where multiple pathways are provided between the CPU/RAM and the storage devices.

A

Multipath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to spread or distribute network traffic load across several network links or network devices.

A

Load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The bonding, binding, or grouping of two or more NICs together to act as a single connection to the network.

A

NIC Teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The duplication of data between two locations.

A

Replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The only means of insurance available to your data resources in the event of a loss, disruption, corruption, intrusion, destruction, infection, or disaster.

A

Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Copies all files to the backup media regardless of the archive bit setting.

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Copies only those files with a set or flagged archive bit. It clears or resets the archive bit, thus selecting only those files that are new or that have changed.

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Copies only those files with a set or flagged archive bit. It doesn’t alter the archive bit, thus selecting only those files that are new or that have changed.

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A copy of the live current operating environment.

A

Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer system that does not allow, support, or retain changes.

A

Non-persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of backup or recovery process that returns to a state of data before edits or changes were implemented.

A

Revert to known state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A concept similar to that of reverting to a known state, but the difference is that a state retention may address a larger portion of the environment than just configuration.

A

Last known-good confirmation (LKGC)

17
Q

A portable storage device that can be used to boot a computer. It contains a read-to-run or portable version of an operating system.

A

Live boot media

18
Q

The availability of a system has been secured to offer reliable assurance that the system will be online, active, and able to respond to requests in a timely manner, and that there will be sufficient bandwidth to accomplish requested tasks in the time required. RAID offers this solution.

A

High availability

19
Q

The order in which a recovery effort should proceed. In most situations, when a disaster strikes, the most mission-critical business processes should be restored first.

A

Restoration order

20
Q

Using multiple different technologies, products, and vendors to support cybersecurity resiliency.

A

Diversity

21
Q

The use of multiple types of access controls in literal or theoretical concentric circles or layers. It should include vendor diversity and control diversity.

A

Defense in depth (Layered security)