Chapter 15: Physical Security & Risk Flashcards

1
Q

A form of fault tolerance that is also called disk mirroring which uses two disks and writes a copy of the data to both disks. pg. 563

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Requiring at least 3 drives, this method of fault tolerance writes the data and then the parity information across all drives. pg. 564

A

RAID 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ and ___ are created to communicate the expected behavior from employees in varied scenarios. pg. 564

A

policies and standards/ procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A widely used proprietary vulnerability scanner developed by Tenable Network Security is called ____. pg. 565

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of test is used to simulate an attack on a system, network, or application? pg. 56

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the 3 strategies for penetration testing based on the objectives of the company. pg. 565

A

Blind Test, Double-blind Test, Target Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly