Chapter 3.8 Flashcards
scalability
Scalability is the capacity to increase the workload on current resources.
Fault Tolerance
Fault tolerance is a product of redundancy and allows that, in the event of a crash, the system will maintain operations by removing the single point of failure. The system will continue to operate without notice.
Elasticity
Elasticity is the ability to resize an environment based on the load. Elasticity is a part of virtualization and can reduce costs. A user can increase or decrease resources as necessary
RAID-0
RAID-0 offers striping only where data is split across the drives. It does not provide redundancy. RAID-0 has the worst data protection of all of the RAID concepts.
RAID-1
RAID-1 provides redundancy through mirroring only. Data is duplicated to two drives.
RAID-5
RAID-5 requires at least three drives and provides striping with parity. It is ideal for servers that have a limited number of data drives.
RAID-10
Redundant array of Inexpensive Disks (RAID) provides increased system availability and fault tolerance for disks. RAID-10 combines mirroring and striping in a single system. It provides better write performance than any other RAID level providing data protection.
automated scripting
The use of automated scripting can help keep systems in a secure state. An automated script can continuously check configurations of a system and react accordingly to keep systems secure and available.
Distributive allocation
Distributive allocation provides that multiple nodes are configured to work together on complex problems. A central processor divides the task into smaller pieces and coordinates tasking the nodes. If a single node fails, processing continues for a high availability solution.
Failover Clusters
Failover clusters use multiple servers to maintain high availability for a server. One configuration remains active, while the other remains inactive. If the active node fails, the inactive one takes over the load.
master image
The master image is a baseline for the system. This image includes the final product of software and security services running on a system. The use of a master image streamlines deployment.
A master image has been tested and secured and maintains its security setting. Therefore, retesting is not necessary. A master image provides secure deployment.