The first consideration in keeping data safe is to ensure the security of the network __________________.
Another term for access permissions is __________ - _____________ _________________.
Implementing password-protected shares involves assigning a password to each shared _________________.
If a share is set up as ___________ - ___________, users can look at the documents or copy them to their machines, but they cannot change the original documents.
Access permission security involves assigning certain ______________ on a user-by-user basis.
The most efficient way to assign permissions is through the use of ______________.
Through auditing, selected types of events are recorded in the _________________ __________ of a server in order to track network activities by user accounts.
A data- __________________ utility scrambles data before it goes out onto the network.
The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to incorporate classified ________________ into the communication systems they sell.
Diskless computers communicate with the server and log on through the use of a special ROM boot chip installed on the computer ________________ _________________ ___________.
The two most important environmental conditions to monitor are _____________________ and __________________.
Proper ____________________ is required to prevent a computer from overheating.
The potential for ESD increases as the humidity ______________.
True or False: If network cables are installed in the walls and in the ceilings, they will be safe from all damage.
A ___________ atmosphere with high __________ will most certainly destroy any computer equipment in a matter of days or months.
The first line of defense against loss of data is usually a ___________ ________________ system.
It is important to have a regular ______________ for backing up data.
Maintaining a __________ of all backups is important for later file recovery.
When backing up across a network, network traffic can be reduced by placing the backup computer on an isolated _______________.
Fault-tolerant systems protect data by duplicating data or placing data in different _______________ sources.
RAID level 0, called ____________ _______________, divides data into 64K blocks and spreads it equally in a fixed rate and order among all disks in an array.
Level 0 disk striping does not offer data ___________________.
Disk __________________ duplicates a partition and moves the duplication onto another physical disk so that there are always two copies of the data.
Duplexing is intended to protect against disk ___________________ failures, as well as media failures.
Writing complete blocks of data to each disk in the array is known as disk ________________.
In Windows NT Server, the ___________ _____________________ program is used to configure Windows NT Server fault tolerance.
In RAID level 10, data that is contained on a physical drive in one array is __________________ on a drive in the second array.
"Clustering" is the term applied to a group of ___________________ systems working together as a single system.