Air conditioning, electrical power, and physical access control are crucial for ensuring continuous operation by maintaining appropriate environmental conditions and safeguarding against physical threats in these.
What are Data Centers?
This organization establishes the standard for copper cabling used in networking computers via Ethernet.
What is IEEE 802?
This abstraction of an execution environment is dynamically available to authorized clients, providing resource quotas and software configurations.
What is a Virtualized Workspace?
This is the term for an opportunity for threats to gain access to individual or organizational assets.
What is a Vulnerability?
This is methodology significantly reduces the cost of a data breach and the likelihood of recurring breaches.
What is Business Continuity Management (BCM)?
These are the three primary functions of a data center.
What are Data Storage, Processing, and Transport Services?
This device serves as the demarcation point between the carrier network and the customer’s network.
What is the Network Interface Unit (NIU)?
This type of hypervisor runs directly on the host's hardware and is isolated from the host's operating system.
What is a Type 1?
This type of hacker exploits computer systems or networks to identify security flaws and make recommendations for improvement.
What are White Hat Hackers?
This is the investigation and assessment of the impact that various risks or attacks can have on an organization.
What is a Business Impact Analysis (BIA)?
These are three key areas of focus in data center modernization.
What are Infrastructure, Cybersecurity, and Managing IT?
This layer 2 device routes traffic via frames inside a network using MAC addresses.
What is a Switch?
Virtual machines enabling easier creation of "clean" installs of operating systems and software makes this easier on them.
What is Software Testing?
This is the term for an attack where an intruder uses another site's IP address to masquerade as the other site.
What is IP Spoofing?
This covers the identification, classification, and response to incidents, with the exception of proactive planning.
What is Incident Response Planning (IRP)?
These are the two primary methods of accessing data stored on a shared storage device.
What are the Block Level and the File Level (depending on the storage protocol being utilized)?
This is a network device used to filter incoming and outgoing traffic by port, IP address, and application
What is a Firewall?
This file stores the memory contents of a virtual machine in a suspended state.
What is a Memory State File?
This type of malware specifically blocks access to systems until money is paid to the attacker.
What is Ransomware?
This consists of actions to guide an organization in stopping, mitigating, and recovering from an incident.
What is Incident Reaction (IR) and Containment?
This is the automated configuration, coordination, and management of computer systems and software using application programming interfaces (APIs) to interact with various systems or applications.
What is Orchestration?
This is a device that connects two or more packet-switched networks.
What is a Router?
This component of virtual networking appears to the guest OS as a NIC and can be bridged to a real network through a physical version of one of these.
What is a Virtual Network Interface Card (NIC)?
This is the protective measure prescribed to meet the security requirements specified for an information system.
What is a Safeguard?
This ensures the continuous operation of critical business systems in the event of widespread or localized disasters.
What is Disaster Recovery (DR)?