term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
Facilitating telecommunications continuity by providing redundant combinations of local carrier T-1 lines, microwaves and/or coaxial cables to access the local communication loop is:
last-mile circuit protection - multiple lines of communication are used to ensure that communication is always up. Last mile relates to a disaster. Its best to have as many options as possible in a disaster.
Greatest concern as disaster recovery hotsite
Disk space utilization data is not kept current. - This is a big issue because if the hot site doesn't have enough disk space, it could end up being completely useless if it ends up being used.
Reduces the ability of one device to capture the packets that are meant for another device?
Switches - Switches are at the lowest level of network security and transmit a packet to the device to which it is addressed. This reduces the ability of one device to capture the packets that are meant for another device
System testing
is testing conducted on a complete, integrated system to evaluate the system's compliance with its specified requirements. This testing is more comprehensive, and best used when trying to determine if a vulnerability, across multiple systems, has been patched and corrected.
Greatest risk when changing vendors for incident resolution.
Application owners are not aware of the change. They should be aware, and this is the greatest risk, as if there was an incident, and application owners did not know about the change in vendors, they would not know how to react or who to contacts during an incident.
Cloud computing issues
SLA does not address responsibility of the vendor (cloud hoster) in the event of a security breach. This is important as if there is a breach, the vendor should inform all parties involved that a security breach occurred, and then determine who was at fault.
When can staging and job set up be used as a compensating control for a defective control
An example of this is when a backup system is configured improperly. If its configured improperly, the configuration could be corrected while the job is being staged and set up.
Effective means of ensuring that production source code and object code is sycronized
Date and time stamp reviews of source and object code. This ensures that code already in production is synced.
Privileged (admin) accounts are used to make critical configuration changes. What is the best way to limit this risk
Supervisory approval and review is performed for changes made with admin accounts
Encapsulation
is an object oriented technology characteristic that prevents accessing of properties of methods of the object that have not been defined as public. An object defines a communication interface with exterior and only that which belongs to an interface that can be accessed
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!