SOLUTIONS RATED A+
✔✔RAID-0 - ✔✔A RAID array in which every time data is written to disk, a portion
(block) is written to each disk in turn, creating a "stripe" of data across the member
disks. RAID 0 uses the total disk space in the array for storage, without protecting the
data from drive failure. (2)
✔✔RAID 1 - ✔✔Mirroring
✔✔RAID 5 - ✔✔A technique that stripes data across three or more drives and uses
parity checking, so that if one drive fails, the other drives can re-create the data stored
on the failed drive. RAID 5 drives increase performance and provide fault tolerance.
Windows calls these drives RAID-5 volumes.
✔✔RAID 10 - ✔✔a combination of RaID 1 and RaID 0 that requires at least four disks to
work as an array of drives and provides the best redundancy and performance.
✔✔disaster recovery plan - ✔✔A detailed process for recovering information or an IT
system in the event of a catastrophic disaster such as a fire or flood
✔✔Business Continuity Plan - ✔✔Guidelines and arrangements for response to
disruption of critical business functions, to restore and maintain operation.
✔✔Change Management - ✔✔Process of making sure changes are made smoothly and
efficiently and do not negatively affect systems reliability, security, confidentiality,
integrity, and availability.
✔✔Configuration Management - ✔✔A process that ensures that the descriptions of a
project's products are correct and complete
✔✔Vulnerability Management - ✔✔The practice of finding and mitigating software
vulnerabilities in computers and networks.
✔✔Patch Management - ✔✔the process of regularly applying patches and updates to
software
✔✔Endpoint-based DLP - ✔✔can scan files stored on a system as well as files sent to
external devices
-can prevent users from copying data to USB drives or sending sensitive info to printers
-
✔✔Network-based DLP - ✔✔scans all outgoing data looking for specific data
, -if sensitive data is sent, the DLP with detect it, prevent it from leaving, and send an
alert
✔✔Data Loss Prevention (DLP) - ✔✔A system that can identify critical data, monitor
how it is being accessed, and protect it from unauthorized users.
✔✔Egress Monitoring - ✔✔monitoring outgoing traffic to prevent data exfiltration
(unauth transfer of data outside an org)
-can involve looking for steganography, watermarking
✔✔Black Box Testing - ✔✔Zero-Knowledge Team
✔✔White-Box Testing - ✔✔Full-Knowledge Team
✔✔Gray-Box Testing - ✔✔Partial-Knowledge Team
✔✔Application-level gateway firewall - ✔✔filters traffic based on specific application
requirements and circuit-level gateway firewalls filter traffic based on the
communications circuit.
✔✔A next-generation firewall - ✔✔functions as a unified threat management (UTM)
device and combines several filtering capabilities.
✔✔Sandboxing - ✔✔provides a security boundary for applications and prevents the
application from interacting with other applications
✔✔Pseudo flaws - ✔✔false vulnerabilities or apparent loopholes intentionally implanted
in a system in an attempt to tempt attackers.
✔✔Intrusion Prevention System (IPS) - ✔✔A technology that monitors activity like an
IDS but will automatically take proactive preventative action if it detects unacceptable
activity.
✔✔network-based IDS - ✔✔An IDS system that primarily uses passive
hardware sensors to monitor traffic on a
specific segment of the network.
✔✔Host-based IDS (HIDS) - ✔✔An intrusion detection system that is host based. An
alternative is an intrusion detection system that is network based.
✔✔host-based IDS - ✔✔An IDS system that primarily uses software installed on a
specific host such as a web server.
✔✔active response - ✔✔a response generated in real time