data defense II Flashcards

1
Q

the ability to respond to an unexpected hardware or software failure without loss of data or loss of operation

A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a method of providing fault tolerance by providing duplicate or multiple components that perform the same function

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the actual time required to successfully recover all operations.

A

Recovery Time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a measurement of how old data is at the point that it is successfully recovered.

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

it identifies the average lifetime of a system or component.

A

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

measures the average time to failure of a system or component.

A

Mean Time To Failure (MTTF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it identifies the average amount of time to repair a failed component or to restore operations

A

Mean Time To Repair (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

combines the RPO, RTO, MTBF, and MTTR to identify the length of time an organization can survive with a specified service, asset, or process down

A

Maximum Tolerable Downtime (MTD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

it is used to secure messages being transmitted on the Internet

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL uses _____ protocol for secure exchanging of encryption keys.

A
RSA or
key exchange (KEA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSL operates at which layer of the OSI model

A

session (layer 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ssl uses which transport layer port

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

designed to replace SSL

A

transport layer security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TLS uses _____ protocol for secure exchanging of encryption keys.

A

RSA or

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

allows for secure interactive control of remote systems.

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec includes what two protocols

A

Authentication Header (AH)

encapsulating security payload (ESP)

17
Q

the authentication headers (AH) provides

A

authenticity, non-repudiation, and integrity

18
Q

Encapsulation security payload (ESP) provides

A

security and confidentiality

19
Q

what are the two modes of AH and ESP

A

transport (encrypts data)

tunnel (encrypts packet)

20
Q

the establishment of shared security information between two network entities to support secure communications is called

A

a security association

21
Q

this protocol is used to establish a security association

A

internet key exchange (IKE)