IT Vocab 13 Flashcards

1
Q

A backup of the system software, including operating system files

A

System backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Directions for disposing and even destroying data when it’s no longer needed or when a storage device needs to be replaced

A

Data Destruction Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A person who is in charge of designing and implementing security methods to protect an organization’s computer systems and networks

A

Security Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method of increasing fault tolerance by providing power backups and power failover

A

Power Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A scheme for classifying information based on different levels of public/private distinctions

A

Public/Private classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A backup of data stored in a database

A

Database Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unscheduled backups performed periodically

A

Ad Hoc Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device that contains one or more hard drives that users can access over the network

A

Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A scheme for classifying information based on government and military requirements

A

Government/Military Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method of increasing fault tolerance by providing multiple network paths between hosts

A

Network Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Concerning security, a person responsible for securing networks and responding to intrusions

A

Systems Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time

A

Off-site backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes

A

Computer Forensics Expert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backups that are stored in the same building or even the same room as the computer systems they are taken from

A

Local backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attribute used to classify information based on the risk of public disclosure

A

Information Sensitivity

17
Q

A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies

A

Data Redundancy

18
Q

Regularly scheduled backups

A

Regular Backup

19
Q

An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster

A

Disaster recovery

20
Q

A reasonable belief that personal information collected by an information system is controlled and protected, not shared or used beyond its original intent

A

Privacy Expectation