Lesson 20 Flashcards

1
Q

A brownout occurs when the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Brownouts are long sags in power output that are often caused by overloaded or faulty grid distribution circuits or by a failure in the supply route from electrical power station to a building.

A

brownouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced strip socket that provides filtered output voltage. A managed unit supports remote administration.

A

power distribution unit (PDU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

A

uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Standby Power Supply fueled by diesel or propane. In the event of a power outage, a UPS must provide transitionary power, as a backup generator cannot be cut-in fast enough.

A

backup power generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Specifications that support redundancy and fault tolerance for different configurations of multiple-device storage systems.

A

Redundant Array of Independent Disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Overprovisioning controllers and cabling so that a host has failover connections to storage media.

A

Multipath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of RAID that using two hard disks, providing the simplest way of protecting a single disk against failure. Data is written to both disks and can be read from either disk.

A

mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A high-speed switching fabric used in SANs and data center networks.

A

Infiniband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Resiliency mechanism where processing and data storage resources are replicated between physically distant sites.

A

Geographical dispersal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recovery of data can be provided through the use of a backup system. Most backup systems provide support for tape devices. This provides a reasonably reliable and quick mechanism for copying critical data. Different backup types (full, incremental, or differential) balance media capacity, time required to backup, and time required to restore.

A

backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A backup type in which all selected files, regardless of prior state, are backed up.

A

full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A backup type in which all selected files that have changed since the last full or incremental backup (whichever was most recent) are backed up.

A

incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A backup type in which all selected files that have changed since the last full backup are backed up.

A

differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Makes snapshot backups of files even if they are open. It is used for Windows backup and the System Restore and Previous Versions features.

A

Volume Shadow Copy Service (VSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A duplicate of an operating system installation (including installed software, settings, and user data) stored on removable media. Windows makes use of image-based backups and they are also used for deploying Windows to multiple PCs rapidly.

A

image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Copying the structure and contents of a physical disk device or logical volume to a single file, using a tool such as dd.

A

Imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A storage device with an embedded OS that supports typical network file access protocols (TCP/IP and SMB for instance).

A

Network Attached Storage (NAS)

18
Q

Tape media provides robust, high-speed, high-capacity backup storage. Tape drives and autoloader libraries can be connected to the SATA and SAS buses or accessed via a SAN.

A

Tape

19
Q

Developed from parallel SCSI, SAS represents the highest performing hard disk interface available.

A

serial attached SCSI (SAS).

20
Q

A network dedicated to data storage, typically consisting of storage devices and servers connected to switches via host bus adapters.

A

storage area networks (SAN)

21
Q

A concept that dictates the sequence in which systems must be brought back online during disaster recovery.

A

order of restoration

22
Q

The property by which a computing environment is discarded once it has finished its assigned task.

A

Non-persistence

23
Q

The process through which an organization’s information systems components are kept in a controlled state that meets the organization’s requirements, including those for security and compliance.

A

Configuration management

24
Q

The process by which the need for change is recorded and approved.

A

Change control

25
Q

The process through which changes to the configuration of information systems are implemented, as part of the organization’s overall configuration management efforts.

A

change management

26
Q

An IT best practice framework, emphasizing the alignment of IT Service Management (ITSM) with business needs. ITIL was first developed in 1989 by the UK government and the ITIL v3 2011 edition is now marketed by AXELOS.

A

ITIL

27
Q

A thing of economic value. For accounting purposes, assets are classified in different ways, such as tangible and intangible or short term and long term. Asset management means identifying each asset and recording its location, attributes, and value in a database.

A

assets

28
Q

A collection of security and configuration settings that are to be applied to a particular system or network in the organization.

A

baseline configuration

29
Q

Applying consistent names and labels to assets and digital resources/identities within a configuration management system.

A

standard naming convention

30
Q

Software consolidating management of multiple DHCP and DNS services to provide oversight into IP address allocation across an enterprise network.

A

IP address management (IPAM)

31
Q

A fully configured alternate network that can be online quickly after a disaster.

A

hot site

32
Q

A location that is dormant or performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site if needed.

A

warm site

33
Q

A predetermined alternate location where a network can be rebuilt after a disaster.

A

cold site

34
Q

An approach that incorporates many different avenues of defense when securing systems and their data against attack. Also known as defense in depth.

A

Layered security

35
Q

A security strategy that positions the layers of network security as network traffic roadblocks; each layer is intended to slow an attack’s progress, rather than eliminating it outright.

A

defense in depth

36
Q

Cybersecurity resilience strategy that increases attack costs by provisioning multiple types of controls, technologies, vendors, and crypto implementations.

A

Diversity

37
Q

The practice of responding to a threat by destroying or deceiving a threat actor’s capabilities.

A

Active defense

38
Q

A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.

A

Honeypots

39
Q

Deception strategy that returns spoofed data in response to network probes.

A

fake telemetry

40
Q

Temporary DNS record that redirects malicious traffic to a controlled IP address.

A

DNS sinkhole