This website uses cookies to ensure you have the best experience. Learn more

Chapter 14 Ensuring Integrity And Availablity Essay

605 words - 3 pages

1. Which of the following percentages represents the highest availability?
 99.99%

2. Which of the following commands allows you to determine how long your Linux server has been running continuously?
 uptime

3. What characteristic of the IRC protocol makes it an effective way to spread viruses and worms quickly?
 It broadcasts communication from one chat room participant to others.

4. You have outsourced your VoIP services to a cloud computing provider that promises a 99.99% uptime. However, one day your IP telephone service is unavailable for a half hour. If this turns out to be the service’s average downtime per month, what is its actual uptime?
 99.93%

5. If you anti-malware uses signature scanning, what must you do to keep the malware-fighting capabilities current?
 Regularly update the anti-malware software's signature database

6. Which of the following power ...view middle of the document...

Suppose you want to use redundant firewalls on your WAN link. Which of the following protocols would allow you to make both firewalls respond to requests for the same IP address?
 CARP-Common Address Redundancy Protocol

12. Which of the following can be considered an advantage of clustering servers over mirroring servers?
 Clustering failover takes place more rapidly.

13. Which of the following offers the highest fault tolerance for shared data and programs?
 SAN’s (Storage area networks)

14. Why do SANs save and retrieve files faster than NAS devices?
 They use a proprietary network transmission method, rather than the Ethernet.

15. Suppose you are the network manager for an ISP whose network contains five file servers that use software RAID, a NAS installation, and a SAN. You learn that the company is taking on a huge web hosting client and you need to add 10TB of storage space as soon as possible. To what part of the network should you add the storage so that it causes the lease disruption to the existing network?
 To the SAN

16. Which factor must you consider when using cloud backups that you don't typically have to consider when backing up to an external device?
 Security

17. In a Grandfather-Father-Son backup scheme, the October-Week 1-Thursday backup tape would contain what type of files?
 files changed since Wednesday (day before)

18. In the Grandfather-Father-Son back up scheme, how frequently is a full back up performed? (Choose all that apply)
 Weekly and Monthly

19. What is the difference between an incremental backup and a differential backup?
 An incremental backup resets the archive bit after backing up files, whereas a differential backup does not.

20. You have been charged with creating a disaster recovery contingency plan for the federal benefits agency where you work. Your supervisor has said that the network must have the highest availability possible, no matter what the cost. Which type of disaster recovery site do you recommend?
 Hot Site

Other Essays Like Chapter 14-Ensuring Integrity and Availablity

Integrity and How It Effects Me

1295 words - 6 pages Integrity and How It Effects Me and Everyone Around Me By AS2(AW) Matthew Schutte Webster's dictionary defines integrity as "uncompromising adherence to a code of moral, artistic or other values; utter sincerity, honesty and candor, avoidance of deception, expediency, or shallowness of any kind" Let us exam this definition a bit deeper. The first part of the definition talks of uncompromising adherence. This means that one would always choose

Distinguish Between the Money and Capital Markets

2205 words - 9 pages individually, we might realize some of the benefits that are derived from a committee development approach by handing out rough drafts to department heads and line managers for input. Compare Ethics Codes There are so many ethics codes available for us to look at. Two codes were included in your textbook in Chapters 6 and 8, and FOI's code in Chapter 14. Below are copies of the three codes from your text. I want you to compare the three codes. Are

Business Plan

1988 words - 8 pages | |Each group will elect/appoint a |based on what we have | |Chapter 2: The Integrity and Ethics of Entrepreneurship | |coordinator. |discussed in class and | | | | |read the | |Group exercise/discussion

Csr of Akij Group

3444 words - 14 pages make acquainted with the Organization. . In the first chapter, we briefly described about the Origin of the study, Objective of the study, Data collection methodology and limitations of the study. In second chapter we described about features of corporate social responsibility of Akij Group of Industries. In the third chapter we include the Company profile, vision, mission, products & services, its operation, operational area, organizational

Kudler's Recommendations

1243 words - 5 pages controls. The implementation of embedded audit modules provides “real-time” auditing techniques, thereby ensuring the reliability and timeliness of Kudler’s financial information. The modules are designed to run in the background detecting abnormal data as it occurs rather than several months after the transaction occurs in the system. With the use of CAATs, Kudler can detect errors or miscalculations in the system providing for timely

Chapter 18: Problems A10 & B2 (P. 542)

934 words - 4 pages Chapter 18: Problems A10 & B2 (p. 542) Regional Software’s estimated dividends per share for next year and the next four based on Lintner’s dividend adjustment model are: DPS1 – DPS0 = ADJ* [POR*EPS1 – DPS0] DPS1 – 1 = 0.75* [0.25*8 – 1] DPS1 = 0.75* [0.25*8 – 1] + 1 DPS1 = 1.75 ===> year 1 DPS DPS2 – DPS1 = ADJ* [POR*EPS2 – DPS1] DPS2 – 1.75 = 0.75* [0.25*8 – 1.75

Environmental Factors

1129 words - 5 pages intellectual and personal growth of the entire associate population. We make diversity part of our business plan, ensuring we can continue to be a global leader in all aspects of Diversity and Inclusion,” (Wal-Mart, n. d.). Wal-Mart marketers use this diversity statement to maintain build public relations. The company diversity statement allows all of their employees and consumers to feel as if they are valued. As with the other factors

Mod 7 Essay Questions

1476 words - 6 pages COM 590 MOD 7 Essay Questions Chap 13 & 14 Dr. Bal Chapter 13 1. Answer. Digital signatures ensure the integrity, authentication, and non-repudiation of a message. A hash value is derived from the original text of the message to generate a digital signature. A hash value is the output of a well-defined mathematical function. Hashing process substantially smaller than the text produces the signature value. 2. Answer. The

Professional Roles and Values

1459 words - 6 pages part of the dietary restriction due to medications. Furthermore, bringing integrity to the team is very beneficial as it also helps develop a rapport. Being honest and upright gives the team a strong backbone ensuring that tasks are completely correctly and also builds trust between coworkers as well as clients. Theory in Professional Practice This writer is greatly influenced by Nightingale’s theory that states that "patients are to be put in

IS4560 Hacking and Countermeasures

3935 words - 16 pages longer secure. 14. What can a digital signature provide? a. Authentication b. Integrity c. Non-repudiation d. Authentication, integrity, and non-repudiation 15. Symmetric encryption requires which of the following? a. Both the parties should send the same length message. b. Both the parties should use the same key. c. Both the parties exchange messages only. d. Both parties must exchange keys and handshakes. 16. Asymmetric

Healthcare Ecosystems

966 words - 4 pages must improve their documentation processes. “If it isn’t documented, it wasn’t done” is more important than ever. It is the responsibility of the HIM professional to ensure the integrity of the patient chart. HIM professionals monitor the quality of documentation and ensure all clinical documentation is complete and accurate. HIM professionals are the key to identifying process problems while keeping in mind patient safety, quality of care, and

Related Papers

Is589 Chapter 1: Questions 7, 14, And 17

584 words - 3 pages Chapter 1: Questions 7, 14, and 17 Question 7 How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)? Answer: A Local Area Network (LAN) is a group of microcomputers or terminals located in the same general area. A Backbone Network (BN) is a large central network that connects most everything on a single company site. A Metropolitan Area Network (MAN

Project Management Essay

544 words - 3 pages exhibit entity integrity? Employee table: Yes, It contains a Primary Key and no NULLS. Benefit Table: No, because it contains a Foreign Key. Job table: NA, does not have a Foreign Key. Plan table: NA, does not have a Foreign Key 7. Problem #14. Do the tables exhibit referential integrity? Employee table: Yes, because it contains a Foreign Key. Benefit table: NA, because it does not contain a Foreign Key. Job table: Yes, because it

Computers In Action Essay

734 words - 3 pages should be created. Databases are often key components of (14) transaction processing system (TPS), which record routine business activities. A(n) (15) decision support system utilizes databases and other related systems to assist management with building business models and making critical decisions. Multiple Choice Instructions: Answer the multiple-choice and true–false questions below for more practice with key terms and concepts from this

Introduction To Uob Essay

2507 words - 11 pages account and also investment advisory. CHAPTER 6 - MARKETING STRATEGY UOB putting customer first The UOB culture is built on integrity, trust and respect. All of this is a core element of fair dealing. For UOB they are already set in mindful that from boardroom to the branch they must treat all customers fairly because for them what is right for customer is what is right for them. Everyone in UOB has a role to play that Fair Dealing is