Learn Disaster Recovery
Study Disaster Recovery using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(22)
Decks
Flashcards
Learners
-
BEC - IT Risks & Controls
BEC - IT Risks & Controls
By: Tired Pup
Risks & Controls - Comp-Based AIS, IT Functions & Controls Related to People, Physical Access Controls7Decks98Flashcards1Learner -
AWS Certification Architect Associate 2022
AWS Certification Architect Associate 2022
By: Peter van Droogenbroeck
Section3: Getting started with AWS, Section4: IAM & AWS CLI, Notes25Decks178Flashcards3Learners -
07. CISM - Chapter 7 - Incident Management Readiness
07. CISM - Chapter 7 - Incident Management Readiness
By: C MC
01. Incident Response Plan (386), 02. Business Impact Analysis (395), 03. Business Continuity Plan (404)7Decks83Flashcards1Learner -
5. Risk Management
5. Risk Management
By: Matthew Schroeder
5.1 Policies, plans and procedures related to organizational security, 5.2 Summarize business impact analysis concepts, 5.3 Risk management processes and concepts8Decks98Flashcards1Learner -
CISSP
CISSP
By: manche bajra
Domain1: laws Regulations & Compliance and investigations, Domain #2: Asset Security, Domain 3: Security Architecture and Engineering8Decks16Flashcards2Learners -
SAP-C02 AWS Certified Solutions Architect - Professional
SAP-C02 AWS Certified Solutions Architect - Professional
By: Luis Dantas
Architecture, Security, Elastic Beanstalk14Decks39Flashcards1Learner -
CompTIA Network+ (N10-008)
CompTIA Network+ (N10-008)
By: Kevin Lain
1.3 Cables and connectors, 2.2 Compare and contrast routing technologies and bandwidth management concepts., 3.3 Explain high availability and disaster recovery concepts and summarize best solution.4Decks28Flashcards2Learners -
Certification in Cybersecurity
Certification in Cybersecurity
By: Xyrus Unknown
Domain 2: Business Continuity, Disaster Recovery, and Incident Response1Decks36Flashcards1Learner -
BIS ISMAN
BIS ISMAN
By: Selina Wong
1.1 Introduction to Information Systems, 1.2 What's New in Management Systems, 1.3 Business Strategy & IT / IS Strategy30Decks215Flashcards1Learner -
Net+ N10-008
Net+ N10-008
By: Carlos Lorenzo
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types, 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution.26Decks93Flashcards2Learners -
Security +
Security +
By: James Smith
Ethical Hacking, Disaster Recovery2Decks31Flashcards1Learner -
CSA CCSK
CSA CCSK
By: Breanna Lowery
DOMAIN 1 - DEFNITIONS OF CLOUD COMPUTING, DOMAIN 1 - CLOUD SECURITY SCOPE, RESPONSIBILTIES, AND MODELS, DOMAIN 2 - TOOLS OF CLOUD GOVERNANCE23Decks227Flashcards1Learner -
CompTIA Network + N10-008
CompTIA Network + N10-008
By: Danny Mishler
1.1 (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types., 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution.26Decks147Flashcards3Learners -
HAZMAT for First Responders
HAZMAT for First Responders
By: Tyler Reyes
Chapter 1: Into to HAZMAT, Chapter 2: Analyzing the Incident: Recognizing and Identifying the Presence of HAZMAT, Chapter 3: Implementing the Response15Decks29Flashcards2Learners -
CompTIA Security+ Certification Exam
CompTIA Security+ Certification Exam
By: Fareedah James
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes.37Decks130Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors29Decks66Flashcards1Learner -
CloudEndure
CloudEndure
By: J. D.
Disaster Recovery, Live Migration, Continuous Data Replication4Decks18Flashcards1Learner -
Eksamen april 2022
Eksamen april 2022
By: Maja Skovrup
Disaster trends, Genocide, Kapitaler11Decks17Flashcards1Learner -
CISSP
CISSP
By: Timothy Southern
Chapter 1 - Security Governance Through Principles and Policies, Chapter 2 - Personnel Security and Risk Management Concepts, Chapter 3 - Business Continuity Planning22Decks25Flashcards1Learner -
CISSP
CISSP
By: Jennifer Toren
Chapter 1: Security Governance, Chapter 2: Personnel Security and Risk Management Concepts, Chapter 3: Business Continuity Planning21Decks19Flashcards1Learner -
CompTIA Security+ SY0-701 Module 1:
CompTIA Security+ SY0-701 Module 1:
By: Mehdi Ouhtit
Slide 1: General Security Concepts, Slide 2: Defense in Depth, Slide 3: Essential Terminology39Decks59Flashcards1Learner -
08 Put it to work
08 Put it to work
By: Amreek Paul
MD1 Event and incident detection: Security as a mindset, MD1 Data and Asset classification, MD1 Your impact on data protection: Detect and protect without neglect36Decks105Flashcards1Learner