Table of content
The first consideration in keeping data safe is to ensure the security of the network __________________.
Another term for access permissions is __________ - _____________ _________________.
Implementing password-protected shares involves assigning a password to each shared _________________.
If a share is set up as ___________ - ___________, users can look at the documents or copy them to their machines, but they cannot change the original documents.
Access permission security involves assigning certain ______________ on a user-by-user basis.
The most efficient way to assign permissions is through the use of ______________.
Through auditing, selected types of events are recorded in the _________________ __________ of a server in order to track network activities by user accounts.
A data- __________________ utility scrambles data before it goes out onto the network.
The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to incorporate classified ________________ into the communication systems they sell.
Diskless computers communicate with the server and log on through the use of a special ROM boot chip installed on the computer ________________ _________________ ___________.
The two most important environmental conditions to monitor are _____________________ and __________________
Proper ____________________ is required to prevent a computer from overheating.
The potential for ESD increases as the humidity ______________.
True or False: If network cables are installed in the walls and in the ceilings, they will be safe from all damage.
A ___________ atmosphere with high __________ will most certainly destroy any computer equipment in a matter of days or months.
The first line of defense against loss of data is usually a ___________ ________________ system.
It is important to have a regular ______________ for backing up data.
Maintaining a __________ of all backups is important for later file recovery.
When backing up across a network, network traffic can be reduced by placing the backup computer on an isolated _______________.
Fault-tolerant systems protect data by duplicating data or placing data in different _______________ sources.
RAID level 0, called ____________ _______________, divides data into 64K blocks and spreads it equally in a fixed rate and order among all disks in an array.
Level 0 disk striping does not offer data ___________________.
Disk __________________ duplicates a partition and moves the duplication onto another physical disk so that there are always two copies of the data.
Duplexing is intended to protect against disk ___________________ failures, as well as media failures.
Writing complete blocks of data to each disk in the array is known as disk ________________.
In Windows NT Server, the ___________ _____________________ program is used to configure Windows NT Server fault tolerance.
In RAID level 10, data that is contained on a physical drive in one array is __________________ on a drive in the second array.
"Clustering" is the term applied to a group of ___________________ systems working together as a single system.
Table of content
MCSE Training Kit: Networking Essentials Plus, Third Edition (IT Professional)
BUY ON AMAZON
Similar book on Amazon
Understanding Digital Signal Processing (2nd Edition)
Networking Essentials: MCSE Self-Paced Kit (Microsoft Training Product)
UNIX For Dummies
Software Testing (2nd Edition)
MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoftu00ae Windows Server(TM) 2003 Active Directoryu00ae and Network Infrastructure (Pro-Certification)
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Lotus Notes and Domino 6 Development (2nd Edition)
Defining a Domino Database
Using Templates as Design Libraries
Enabling Database Encryption
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Cisco Secure IDS
Laws, Standards, and Organizations
Security Business Issues
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 342 Intermediate Metal Conduit Type IMC
Article 384 Strut-Type Channel Raceway
Article 504 Intrinsically Safe Systems
Notes to Tables
Example No. D9 Feeder Ampacity Determination for Generator Field Control
Web Systems Design and Online Consumer Behavior
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XIV Product Catalog and Shopping Cart Effective Design
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Executing Corporate Strategy with Lean Six Sigma
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Service Process Challenges
Using DMAIC to Improve Service Processes
Designing World-Class Services (Design for Lean Six Sigma)
Python Programming for the Absolute Beginner, 3rd Edition
And Now for Something Completely Different
Packing and Unpacking Files
Widgets and Gadgets and GUIs, Oh My!
Plumbing the Internet
flylib.com © 2008-2017.
If you may any questions please contact us: firstname.lastname@example.org
to find out more.