2.5 Given a scenario, implement cybersecurity resilience. Flashcards

1
Q

RAID 0

A

Stripping without parity
redundant array of independent disk
No redundancy, high performance, and no fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Raid 1

A

Mirroring
Duplicate data for fault tolerance
Requires twice the disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Raid 5

A

Striping with parity
Fault-tolerant only requires an additional disk for redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Load Balancing

A

Balance load between multiple servers. The person will access the load balancer, and the load balancer will decide which server the user will get.
Some servers are active, and others are on standby
If the active server does not pass the hello server health check, it will start to use one of the standby servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nic teaming

A

Also referred to as Load balancing/fail over LBFO.
increase through put and a way to have redundant paths.
Multiple network adapters on a single server.
Within the server the NICs will talk to each other and if one fails it fails over to the other nic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UPS

A

Uninterruptible Power Supply.
Short term backup power
helps with blackouts, brownouts and surges.

Offline/Standy UP - short term.

Line-interactive UPS- helps with brown outs and fill in difference for power source
O-line/Double-conversion - expensive, Always on line and always provides power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

generator

A

Long-term power backup can keep power running for days or weeks at a time.
It can power the entire building.
Usually, there is a 10-15 second waiting period. You would typically combine this with a ups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SAN replication

A

Share data between different devices.
If one fails, you can still work with data
Storage Area Network - Specialized high-performance network storage of storage devices.
SAN to SAN replication. Duplicate data from one data center to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAN Snapshot

A

Create a state of data based on a point of time
Copy that state to other SANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VM Replication

A

Virtual Machine redundancy
Maintain one VM and replicate to others
Consistent service offering
Recover from a replicated copy.
Efficient copying - only replicates the data that has been changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On-premise vs Cloud redundancy

A

Speed :
Local device connections are very fast
cloud connections are much slower.
Money:
Local storage is more expensive. Cloud is cheaper

Security:
Local data is private
Cloud data requires additional security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an archive bit?

A

This is a bit in microsoft that tells us that a file system object has been modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Full backup

A

Backs up every single file on the system.
The archive bit is cleared after the backup.
This takes the longest, and restoration time is low.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental backup

A

After a full backup, you will back up all of the files that have changed since the last backup.
To perform a recovery, you will need all of the previous incremental backups and the full backup.
Restoration time is high due to the need for the full backup and all of the subsequent incremental backup
Archive bit is cleared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

differential backup

A

I will back up all files that have changed since the last full backup.
To restore, you will need the full backup and then the last differential backup.
Take a moderate amount of time to do this backup. But to restore, you only need two sets of backups, The full and the last differential.
Archive bit is not cleared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Magnetic tape

A

Perfect archive media
sequential storage
Easy to hip and store

17
Q

Disk

A

Faster than magnetic tape
deduplicate and compress

18
Q

Copy or Image

A

Useful strategy
May not include versioning, may need to keep offsite

19
Q

NAS

A

Network-attached Storage
Connect to a shared storage device across the network
File-level access - if you need to change a file, you must rewrite the entire file on the NAS.
Requires a lot of bandwidth

20
Q

SAS

A

It looks and feels like a local storage device
block-level access - if you need to change a single portion of a very large file, you only need to change the portion on the disk.
Very efficient reading and writing.
Requires a lot of bandwidth

21
Q

Cloud backups

A

Automatic off-site backup functions.
Take files on local device backup to the cloud.
Requires a lot of bandwidth

22
Q

Image backup

A

Create an exact duplicate or replica of everything on a storage device, including systems files and your documents.

23
Q

Offline backup

A

Backup to local devices
Fast and secure
Must be protected and maintained
requires storage in the offsite facility for disaster recovery.

24
Q

Online Backup

A

Constantly accessible and constantly updated throughout the day.
Remote network connected third party.
Encrypted
Speed is limited by network bandwidth

25
Q

Non persistence

A

Meaning a system that is always changing. the cloud on non-persistent

26
Q

High Availability

A

Redundancy doesn’t always mean always available.
HA(high availability) means always on and always available.
It may include many different components working together.
Active/Active can provide scalability advantages.
Higher Availability almost always means higher cost. There is always another contingency you could add.
Upgrade power, high-quality server components, etc.

27
Q

Diversity

A
  • Technologies - different OS being used or different security components
    -Vendors - using different vendors for different manufacturers and working with different support teams, not relying on any single vendor.
  • Cryptography - all cryptography is temporary. Diverse certificate authorities.
    Controls - Admin controls, physical controls, technical controls. Defense in depth.
28
Q

Synchronous replication

A

particularly sensitive to distance. With synchronous replication, sites will replicate with each other at the same time. Latency is a possibility with slow links and long distances.
Synchronous (not Asynchronous) replication indicates data must be written at both sites to be considered valid. A slow link will result in longer wait times for data synchronization.

29
Q

Asynchronous replication

A

is a data protection process that indicates data is mirrored from a primary site to a secondary site.
not as particularly sensitive to distance as synchronous due to the one-way synchronization

30
Q

Raid 6

A

Redundant array of inexpensive disks (RAID) provides increased system availability and fault tolerance for disks. RAID-6 requires four disks and can survive a failure on two.

31
Q

Raid 10

A

Redundant array of inexpensive disks (RAID)-10 combines mirroring and striping in a single system. It delivers better write performance than any other RAID level providing data protection. RAID 10 requires a minimum of four disks.

32
Q

What is the correct way to bring a Datacenter back up after a loss of power

A

Step 1. Enable and test power

Step 2. Enable and test infrastructure

Step 3. Enable and test critical network servers

If systems are brought back online in an uncontrolled way, there is the serious risk of causing additional power problems. Due to computer system dependencies, network infrastructure such as switches should be brought online before any computer systems.

33
Q

Faraday Cage

A

A Faraday Cage can block electromagnetic fields, radio frequencies, and electrostatic signals. The enclosure can keep signals out and block them from going into the secure area providing a physical security layer.

34
Q

PDU

A

A power distribution unit (PDU) distributes power to networking equipment within racks. It provides protection against electrical spikes and can integrate with UPS.

35
Q
A