Chapter 9 Resilience and Physical Security Flashcards

1
Q

Redundancy

A

Having more than one of a system, service, device or component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Redundancy Design Elements

A
  • Geographic dispersal of systems ensures that a single disaster, attack, or failure cannot destroy a system. Place data centers 90+ miles apart.
  • Separation of servers used to avoid single rack being a point of failure.
  • use of multiple network paths (multi-path) solutions
    -protection of power
  • Power: UPS (uninterruptible power supply) for short term, generators for long term
    Diversity of Technologies (resilient, but costly)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Load Balancer

A

Device that acts as a reverse proxy and distributes network or application traffic across multiple servers. This increases reliability and capacity of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIC Teaming

A

Combines multiple network cards into a single virtual network connection. this balances loads and increases fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAID (redundant array of inexpensive disks)

A

Data Striping - spread across disks
Data Mirroring - completely copied
Parity - ensures data is not corrupted or lost
RAID 10 is best when speed and resilience are important and cost is not. RAID 5 and 6 can survive a drive loss but have slow performance.
ADD NOTES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backup Types:
Full
Incremental
Differential

A

Full backup copies the entire system or device.
Incremental backup copies everything since the last incremental backup.
Differential backup copies everything since the last full back up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Snapshot vs. Images

A

Snapshots capture full state of a system at the time the backup is completed. Common for VMs.

Images are similar, but are a complete copy of a system or server down to the bit level for the drive. Completely match the system, backup method of choice for servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Backup storage types:
Tape
Disks
Optical Media
Flash Media
A

Tape is inexpensive
Disks are more expensive but faster than tape
Optical media like Blu-ray and DVD are not common bc capacity reason
Flash media fine for short term copies, not used at enterprise scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Online vs. Offline backup storage

A

Online is always available for fast retrieval and access, but require power and expense.
Offline is cheaper but slower to access. can be used to ensure an organization does not have a total data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Backups and software-defined infrastructure models

A

systems that would’ve once been backed up aren’t being backed up. Instead, the code that defines them is backed up as well as key data they are designed to access or provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Considerations for cloud and offsite backup options

A

Bandwidth requirements, for backups themselves as well as restoration time.
Time to retrieve files and cost to retrieve files. (Amazon Glacier focuses on low cost storage but high cost retrieval, as well as slower times)
Reliability - some cloud backup providers have higher reliability than local tape or disk options.
New security models - separation of accounts, additional controls, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a SAN?

A

A Storage Area Network is a dedicated, high speed network that provides access to block level storage. CompTIA mentions SANs in two ways:

  1. As a means of replicating data, where SANs use RAID to ensure that data is not lost.
  2. SANs as a type of backup, in which they can be looked at as a network attached array of disks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is NAS?

A

Network Attached Storage is a storage server connected to a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is nonpersistence?

A

The ability to have systems or services spun up or shut down as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you do when a system has been compromised or the OS is so seriously impacted that it can’t properly function?

A

Revert back to the last known good configuration. This can be done using live boot media, which is a bootable operating system that can be run from a thumb drive or DVD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vertical vs. Horizontal Scalability

Scalability: spread load across many servers rather than requiring a larger single server.

A

Vertical Scalability requires a larger or more powerful system (can be expensive);
Horizontal scalability uses smaller systems but adds more of them, and allows for adjustment as needs grow or shrink.

17
Q

What are the three types of disaster recovery sites used for site resilience?

A

Hot Sites have all of the infrastructure and data needed to operate the organization.
Warm Sites have some or all of the systems needed but do not actually have the live data.
Cold Sites have space, power, and networking but are not prepared with systems or data, and are much cheaper to maintain.

18
Q

What is restoration order?

A

The order in which systems are restored after an outage.

One must balance the criticality of systems of the organization against the need for other infrastructure.

19
Q

Physical Site Security Concepts

A
Industrial Camouflage: unmarked or otherwise innocuous buildings
Fences
Lighting
Bollards are posts placed in front of entrances to prevent accidental or intentional vehicle accidents.
Drone defense
Badges required for entry. 
Alarm systems
Fire suppression systems.
20
Q

Secure Data Destruction

A
Most Secure document destruction:
- Burning
- Pulping
Less secure:
- shredding
Most secure device destruction:
- Pulverizing
less secure:
- Degaussing
21
Q

How should SSDs be wiped?
Zero wipe
Secure erase command
Full disk encryption with key destruction.

A

In order, Full disk encryption, then secure erase command if supported, then zero wiped.