Security, Chapter 13

Business

49 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Archive bit
File setting that indicates whether a file should be backed up
Asymmetric server cluster
Technology in which a standby server exists only to take over for another server in the event of its failure
Backup generator
Separate generator powered by diesel, natural gas or propane gasto generate electricity
Bit stream backup
Backup copy of each bit on a computer hard drive, also known as mirror image backup
Business continuity
Ability of an organization to maintain its operations and services in the face of a disruptive event
Chain of custody
Process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence
Clean agent systems
Stationary fire suppression system that does not harm people, documents, or electrical equipment
Cold site
Remote site that provides office space;the customer must provide and install all the equipment needed to continue operations
Computer forensics
Using technology to search for computer evidence of a crime
(CDP) continuous data protection
Continuous data backups that can be restored immediately
Data backups
Process of copying information to a different media and storing it at an off site location so that it can be used in the event of a disaster
Disaster recovery
Procedures and processes for restoring an organization IT operations following a disaster
(DRP) disaster recovery plan
Written document that details the process for restoring IT resources following an event that causes a significant disruption in service
Disk duplexing
Using separate disk controller cards for each disk in a RAID
Disk mirroring
Using multiple drives in the file server that are all connected to the same disk controller card; used in Raid Level 1