Deck 14: Ensuring Integrity and Availability

Full screen (f)
exit full mode
Question
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
Use Space or
up arrow
down arrow
to flip the card.
Question
Protection against harmful code involves more than just installing anti-malware software.
Question
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.

A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
Question
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.

A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
Question
A(n) ____ is a deviation from a specified level of system performance for a given period of time.

A) fault
B) failure
C) error
D) hoax
Question
Generators provide surge protection.
Question
A program that disguises itself as something useful but actually harms your system is called a ____.

A) virus
B) worm
C) bot
D) Trojan horse
Question
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.

A) Redundancy
B) Failover
C) RAID
D) Load balancing
Question
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

A) standby
B) offline
C) offsite
D) online
Question
____ is intended to eliminate single points of failure.

A) Availability
B) Redundancy
C) Contingency
D) Integrity
Question
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

A) star
B) SONET ring
C) bus
D) ring
Question
Power that is free from noise is called "____" power.

A) clear
B) clean
C) filtered
D) white
Question
An anti-malware policy is meant to protect the network from damage and downtime.
Question
When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
Question
A(n) ____ virus disguises itself as a legitimate program to prevent detection.

A) stealth
B) encrypted
C) time dependent
D) polymorphic
Question
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
Question
A ____ is a program that runs automatically, without requiring a person to start or stop it.

A) virus
B) worm
C) bot
D) Trojan horse
Question
A(n) ____ virus changes its characteristics every time it is transferred to a new system.

A) stealth
B) encrypted
C) time dependent
D) polymorphic
Question
____ are programs that run independently and travel between computers and across networks.

A) Viruses
B) Worms
C) Bots
D) Trojan horses
Question
____ is a fault-tolerance technique that links multiple servers together to act as a single server.

A) Clustering
B) Grouping
C) Mirroring
D) Duplicating
Question
An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.

A) bit
B) byte
C) word
D) field
Question
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

A) NAS
B) RAID
C) SANs
D) Optical media
Question
Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies.
Question
Describe how an organization implements anti-malware software.
Question
Explain why it is important to keep backups, boot disks, and emergency repair disks current and available.
Question
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
Question
Describe clustering and explain why it is more cost-effective than mirroring for large networks.
Question
Define mirroring and server mirroring. Describe the necessary requirement for server mirroring.
Question
A(n) ____________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
Question
Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
Question
What are external disk drives and why are they useful?
Question
____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
Question
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

A) Tape backup media
B) Optical media
C) Fiber optic media
D) USB
Question
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
Question
____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability.

A) Clustered
B) Mirrored
C) Grouped
D) Shared
Question
A group of hard disks is called a ____.

A) RAID group
B) disk volume
C) disk array
D) disk partition
Question
Define and describe a virus.
Question
____ are distinct networks of storage devices that communicate directly with each other and with other networks.

A) NAS
B) RAID
C) SANs
D) Optical media
Question
What is integrity checking?
Question
Explain the concept of a backup strategy and provide a list of eight questions the strategy should address.
Question
Describe a backup rotation scheme and explain the goal of a good scheme.
Question
Match between columns
A complete power loss.
warm site
A complete power loss.
noise
A complete power loss.
Availability
A complete power loss.
brownout
A complete power loss.
cold site
A complete power loss.
integrity
A complete power loss.
surge
A complete power loss.
hot site
A complete power loss.
blackout
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
warm site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
noise
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
Availability
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
brownout
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
cold site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
integrity
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
surge
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
hot site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
blackout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
warm site
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
noise
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
Availability
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
brownout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
cold site
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
integrity
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
surge
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
hot site
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
blackout
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
warm site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
noise
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
Availability
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
brownout
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
cold site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
integrity
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
surge
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
hot site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
blackout
Refers to the soundness of a network's programs, data, services, devices, and connections.
warm site
Refers to the soundness of a network's programs, data, services, devices, and connections.
noise
Refers to the soundness of a network's programs, data, services, devices, and connections.
Availability
Refers to the soundness of a network's programs, data, services, devices, and connections.
brownout
Refers to the soundness of a network's programs, data, services, devices, and connections.
cold site
Refers to the soundness of a network's programs, data, services, devices, and connections.
integrity
Refers to the soundness of a network's programs, data, services, devices, and connections.
surge
Refers to the soundness of a network's programs, data, services, devices, and connections.
hot site
Refers to the soundness of a network's programs, data, services, devices, and connections.
blackout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
Availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
cold site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
integrity
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
blackout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
Availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
cold site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
integrity
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
blackout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
Availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
cold site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
integrity
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
blackout
A momentary decrease in voltage.
warm site
A momentary decrease in voltage.
noise
A momentary decrease in voltage.
Availability
A momentary decrease in voltage.
brownout
A momentary decrease in voltage.
cold site
A momentary decrease in voltage.
integrity
A momentary decrease in voltage.
surge
A momentary decrease in voltage.
hot site
A momentary decrease in voltage.
blackout
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Ensuring Integrity and Availability
1
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
A
2
Protection against harmful code involves more than just installing anti-malware software.
True
3
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.

A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
D
4
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.

A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is a deviation from a specified level of system performance for a given period of time.

A) fault
B) failure
C) error
D) hoax
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Generators provide surge protection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A program that disguises itself as something useful but actually harms your system is called a ____.

A) virus
B) worm
C) bot
D) Trojan horse
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.

A) Redundancy
B) Failover
C) RAID
D) Load balancing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

A) standby
B) offline
C) offsite
D) online
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is intended to eliminate single points of failure.

A) Availability
B) Redundancy
C) Contingency
D) Integrity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

A) star
B) SONET ring
C) bus
D) ring
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Power that is free from noise is called "____" power.

A) clear
B) clean
C) filtered
D) white
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
An anti-malware policy is meant to protect the network from damage and downtime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____ virus disguises itself as a legitimate program to prevent detection.

A) stealth
B) encrypted
C) time dependent
D) polymorphic
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A ____ is a program that runs automatically, without requiring a person to start or stop it.

A) virus
B) worm
C) bot
D) Trojan horse
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ____ virus changes its characteristics every time it is transferred to a new system.

A) stealth
B) encrypted
C) time dependent
D) polymorphic
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ are programs that run independently and travel between computers and across networks.

A) Viruses
B) Worms
C) Bots
D) Trojan horses
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is a fault-tolerance technique that links multiple servers together to act as a single server.

A) Clustering
B) Grouping
C) Mirroring
D) Duplicating
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.

A) bit
B) byte
C) word
D) field
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

A) NAS
B) RAID
C) SANs
D) Optical media
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Describe how an organization implements anti-malware software.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Explain why it is important to keep backups, boot disks, and emergency repair disks current and available.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Describe clustering and explain why it is more cost-effective than mirroring for large networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Define mirroring and server mirroring. Describe the necessary requirement for server mirroring.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What are external disk drives and why are they useful?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

A) Tape backup media
B) Optical media
C) Fiber optic media
D) USB
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability.

A) Clustered
B) Mirrored
C) Grouped
D) Shared
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A group of hard disks is called a ____.

A) RAID group
B) disk volume
C) disk array
D) disk partition
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Define and describe a virus.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ are distinct networks of storage devices that communicate directly with each other and with other networks.

A) NAS
B) RAID
C) SANs
D) Optical media
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What is integrity checking?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Explain the concept of a backup strategy and provide a list of eight questions the strategy should address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe a backup rotation scheme and explain the goal of a good scheme.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
A complete power loss.
warm site
A complete power loss.
noise
A complete power loss.
Availability
A complete power loss.
brownout
A complete power loss.
cold site
A complete power loss.
integrity
A complete power loss.
surge
A complete power loss.
hot site
A complete power loss.
blackout
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
warm site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
noise
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
Availability
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
brownout
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
cold site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
integrity
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
surge
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
hot site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
blackout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
warm site
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
noise
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
Availability
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
brownout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
cold site
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
integrity
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
surge
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
hot site
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
blackout
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
warm site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
noise
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
Availability
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
brownout
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
cold site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
integrity
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
surge
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
hot site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
blackout
Refers to the soundness of a network's programs, data, services, devices, and connections.
warm site
Refers to the soundness of a network's programs, data, services, devices, and connections.
noise
Refers to the soundness of a network's programs, data, services, devices, and connections.
Availability
Refers to the soundness of a network's programs, data, services, devices, and connections.
brownout
Refers to the soundness of a network's programs, data, services, devices, and connections.
cold site
Refers to the soundness of a network's programs, data, services, devices, and connections.
integrity
Refers to the soundness of a network's programs, data, services, devices, and connections.
surge
Refers to the soundness of a network's programs, data, services, devices, and connections.
hot site
Refers to the soundness of a network's programs, data, services, devices, and connections.
blackout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
Availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
cold site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
integrity
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
blackout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
Availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
cold site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
integrity
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
blackout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
Availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
cold site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
integrity
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
blackout
A momentary decrease in voltage.
warm site
A momentary decrease in voltage.
noise
A momentary decrease in voltage.
Availability
A momentary decrease in voltage.
brownout
A momentary decrease in voltage.
cold site
A momentary decrease in voltage.
integrity
A momentary decrease in voltage.
surge
A momentary decrease in voltage.
hot site
A momentary decrease in voltage.
blackout
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.