Data Centers
Infrastructure
Virtualization
Cybersecurity
Business Continuity & Disaster Recovery
100

Air conditioning, electrical power, and physical access control are crucial for ensuring continuous operation by maintaining appropriate environmental conditions and safeguarding against physical threats in these.

What are Data Centers?

100

This organization establishes the standard for copper cabling used in networking computers via Ethernet. 

What is IEEE 802?

100

This abstraction of an execution environment is dynamically available to authorized clients, providing resource quotas and software configurations.

What is a Virtualized Workspace?

100

This is the term for an opportunity for threats to gain access to individual or organizational assets.

What is a Vulnerability?

100

This is methodology significantly reduces the cost of a data breach and the likelihood of recurring breaches.

What is Business Continuity Management (BCM)?

200

These are the three primary functions of a data center.

What are Data Storage, Processing, and Transport Services?

200

This device serves as the demarcation point between the carrier network and the customer’s network.

What is the Network Interface Unit (NIU)?

200

This type of hypervisor runs directly on the host's hardware and is isolated from the host's operating system.

What is a Type 1?

200

This type of hacker exploits computer systems or networks to identify security flaws and make recommendations for improvement.

What are White Hat Hackers?

200

This is the investigation and assessment of the impact that various risks or attacks can have on an organization.

What is a Business Impact Analysis (BIA)?

300

These are three key areas of focus in data center modernization.

What are Infrastructure, Cybersecurity, and Managing IT?

300

This layer 2 device routes traffic via frames inside a network using MAC addresses.

What is a Switch?

300

Virtual machines enabling easier creation of "clean" installs of operating systems and software makes this easier on them.

What is Software Testing?

300

This is the term for an attack where an intruder uses another site's IP address to masquerade as the other site.

What is IP Spoofing?

300

This covers the identification, classification, and response to incidents, with the exception of proactive planning.

What is Incident Response Planning (IRP)?

400

These are the two primary methods of accessing data stored on a shared storage device.

What are the Block Level and the File Level (depending on the storage protocol being utilized)?

400

This is a network device used to filter incoming and outgoing traffic by port, IP address, and application 

What is a Firewall?

400

This file stores the memory contents of a virtual machine in a suspended state.

What is a Memory State File?

400

This type of malware specifically blocks access to systems until money is paid to the attacker.

What is Ransomware?

400

This consists of actions to guide an organization in stopping, mitigating, and recovering from an incident.

What is Incident Reaction (IR) and Containment?

500

This is the automated configuration, coordination, and management of computer systems and software using application programming interfaces (APIs) to interact with various systems or applications. 

What is Orchestration?

500

This is a device that connects two or more packet-switched networks.

What is a Router?

500

This component of virtual networking appears to the guest OS as a NIC and can be bridged to a real network through a physical version of one of these.

What is a Virtual Network Interface Card (NIC)?

500

This is the protective measure prescribed to meet the security requirements specified for an information system.

What is a Safeguard?

500

This ensures the continuous operation of critical business systems in the event of widespread or localized disasters.

What is Disaster Recovery (DR)?