Скачать в pdf «Network+»

17.    A, D, E, F. Any item that could be used to gain access to a company’s resources should be collected during the exit interview of an employee. Keys, badges, and important papers (like schematics) should be obtained along with any company property (intellectual or otherwise).

18.    C. For an absolutely secure installation, the only recording devices that should be on the premises are company-owned and -operated devices like security cameras.

19.    A, C. Active intrusion systems detect intrusions or possible intrusions the moment they occur and take actions to prevent the intrusion. These systems, if working correctly, should only affect the intruder.

20.    C. Although many of these attacks can affect Windows systems, only one—WinNuke—was designed specifically to attack Windows systems. It works because of a bug in the Windows TCP/IP stack.



Fault Tolerance and Disaster Recovery


S 3.5 Identify the purpose and characteristics of fault tolerance. S 3.6 Identify the purpose and characteristics of disaster recovery.

omputers are not perfect. They can (and do) have problems that affect their users’ productivity. These problems range from small errors to total system failure. Errors and failures can be the result of environmental problems, hardware and software failure, hacking (malicious, unauthorized use of a computer or a network), as well as natural disasters.

In all cases, you can take measures to minimize the impact of computer and network problems. These measures fall into two major categories: fault tolerance and disaster recovery. Fault tolerance is the capability of a computer or a network system to respond to a condition automatically, usually resolving it, and thus reducing the impact on the system. If fault-tolerant measures have been implemented, it is unlikely that a user would know that a problem existed. Disaster recovery, as its name suggests, is the ability to get a system functional after a total system failure (a disaster for a company and the network administrator) in the least amount of time. Strictly speaking, if enough fault tolerance methods are in place, you shouldn’t need disaster recovery.

Скачать в pdf «Network+»