Security Operations Flashcards

1
Q

Bypass Label Processing

A

Can give someone the ability to bypass the security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data mirroring

A

Is the replication of data on separate disks in real time to ensure continuous availability, currency, and accuracy (i.e. RAID Level 1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data remanence

A

In the residual physical representation of data remaining on media after the data has been in some way erased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Database shadowing

A

Reduces recovery time from a database failure by using a database restore and roll-forward process, using a backup and the journals to enable recovery without data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Degaussing

A

Leaves the domains in random patters with no preference to orientation, thereby rendering previous data unrecoverable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Electronic vaulting

A

Is the bulk transfer of backup data over communications facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File image

A

Backup software that creates disk image files with extract, byte-by-byte copies of a hard drive, partition, or logical disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Initial Program Load (IPL)

A

Starting a system program with required system software, and operating the computer system as directed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious code

A

Software that performs unauthorized functions causing the normal operation of an information system to be abnormal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Need-to-know

A

Describes the restriction of data, which is considered very sensitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Redundant servers

A

Provides fault tolerance by having one or more entire systems available in case the primary one crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote journaling

A

Delivers real-time database data integrity by capturing and transmitting the journal and transaction log data offsite as they are created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Special Priviledge Accounts

A

These accounts are privileged (Root or built-in Administrator Accounts, Service Accounts, Administrator Accounts, and Power User Accounts).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly