Security+ Guide to Network Security Fundamentals

This preview shows page 10 - 12 out of 12 pages.

Answer: Forensics 3. The ____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence. Answer: chain of custody 4. ____ can contain any information that has been created, viewed, modified, downloaded, or copied since the computer was last booted. Answer: RAM slack Class Discussion Topics 1. What are the benefits of creating a disaster recovery plan? 2. Why is it important to preserve the chain of custody? Additional Projects 1. Ask your students to read the following article “Making sense of 'Mean Time To Failure'” at - failure-mttf/310 and write a report summarizing its most important points. 2. Ask your students to read more about RAID Level 1 and write a report explaining how to implement RAID 1 on Windows Server 2003. Use the following link as a starting point: . Additional Resources 1. Fault-tolerant design 2. Mean time between failures 3. Grandfather-Father-Son Backup Strategy
Image of page 10

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 13-11 4. The Complete, Unofficial TEMPEST Information Page 5. Van Eck phreaking Key Terms asymmetric server cluster A technology in which a standby server exists only to take over for another server in the event of its failure. backout/contingency option Rolling back a disaster recovery implementation to the starting point so that a different approach can be taken. business continuity The ability of an organization to maintain its operations and services in the face of a disruptive event. business continuity planning and testing The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient. business impact analysis (BIA) An analysis of the most important mission-critical business functions, which identifies and quantifies the impact such a loss of the functions may have on the organization in terms of its operational and financial position. chain of custody A process of documentation that shows that the evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence. cold site A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations. computer forensics Using technology to search for computer evidence of a crime.
Image of page 11
Image of page 12
You've reached the end of this preview.
  • '
  • NoProfessor
  • Hard disk drive, Network Security Fundamentals, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern