Backup Flashcards

1
Q

What are external and additional ways to backup data?

A

an external hard drive, USB Stick

The best practice is storing backup data off site, giving you excellent protection so that you have an alternative way of accessing it. Practicing the following four steps protects your data from unexpected shutdowns, technological failure, and malicious cyber activity. Let’s begin with step 1, replication. This concerns copying data from one location to another. It’s like the autosave function in Microsoft Word that keeps recoverable near real time copies of your information. Step 2 is snapshots. A data snapshot is a regular save point throughout the day. It’s good to implement a policy to schedule automatic saving of all your business information. The third step involves daily backups. In addition to regular snapshots, it’s beneficial to store your information in a second location that is not on your premises. Therefore, saving to the Cloud means that any incidents your business potentially suffers stops at Cloud storage. Here, additional safety

checks are also carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the 3-2-1 backup strategy?

A

3-2-1 Backup

Strategy is regarded as the most effective backup route and relates to creating your backups. If the information is particularly important, why not create three snapshots of the data? This is exactly what the 3-2-1 strategy is. Use two different formats such as locally on your computer where you create the information, as well as on your data server. Ideally, one of these copies is kept off site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is On-premises/site computing?

A

On-premises computing refers to the traditional approach of hosting everything on-site. This includes the hardware, operating systems, applications, and all associated infrastructure. This would include the data that is required for the business need. Typically, this would require an in-house IT department to oversee the network configuration and troubleshoot any hardware or software issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cloud computing?

A

Cloud computing refers to the newer practice of hosting the data, software platforms, applications, operating systems, and all associated infrastructure online. An enterprise would pay for what they require in the same way a contractor would pay for the services of each tradesman they employed in a house build.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Just-In-Time (JIT)?

A

JIT means that having accessed a given area; you will only retain your access for a limited period of time before you are automatically ejected or asked to re-enter some authorization code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Just-Enough-Access (JEA)?

A

JEA relates to the limitations on the changes you can make while there. As a security specialist configures which areas should be accessed by which individuals, as well as what privileges are required when a specialized task needs to be engaged very carefully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly