Created by
Terms in this set (15)
Redundancy
EXPLANATION
Redundancy is the primary security feature that can be designed into a network's infrastructure to protect and support availability, since it identifies single points of failure.
Periodic backups are better than no backups, but real-time and off-site backups are better protections for availability. Fiber optic cables are not a real protection for a network's availability, as they only provide the security benefit of eavesdropping protection. Switches are better than hubs, but there are infrastructure security measures that provide more significant protections for availability.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
Redundancy is the primary security feature that can be designed into a network's infrastructure to protect and support availability, since it identifies single points of failure.
Periodic backups are better than no backups, but real-time and off-site backups are better protections for availability. Fiber optic cables are not a real protection for a network's availability, as they only provide the security benefit of eavesdropping protection. Switches are better than hubs, but there are infrastructure security measures that provide more significant protections for availability.
REFERENCES
LabSim for Security Pro, Section 9.12.
Reciprocal agreement
EXPLANATION
A reciprocal agreement is a contract between two organizations that states in the event of a disaster they will aid each other by sharing their IT processing capabilities. Reciprocal agreements have no initial cost related to them. However, most organizations can barely support their own IT needs, much less the needs of an entire second organization.
A hot site, warm site, and service bureau contracts are all costly alternatives, but offer reasonable if not reliable assurance of recovery in the event of a disaster.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
A reciprocal agreement is a contract between two organizations that states in the event of a disaster they will aid each other by sharing their IT processing capabilities. Reciprocal agreements have no initial cost related to them. However, most organizations can barely support their own IT needs, much less the needs of an entire second organization.
A hot site, warm site, and service bureau contracts are all costly alternatives, but offer reasonable if not reliable assurance of recovery in the event of a disaster.
REFERENCES
LabSim for Security Pro, Section 9.12.
You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply.
Considering the availability of your website, which component represents a single point of failure?
Web server
Website storage
Network adapter
Power supply
Considering the availability of your website, which component represents a single point of failure?
Web server
Website storage
Network adapter
Power supply
Website storage
EXPLANATION
In this scenario, the shared storage is a single point of failure. A single point of failure means that failure in one component will cause the entire website to be unavailable. If the storage unit fails, then the website content will be unavailable.
Failure in a single network card, power supply, or even in a single server will not make the website unavailable. Any of these failures will take one server offline. But because of the server cluster, other servers will still be available to process incoming requests.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
In this scenario, the shared storage is a single point of failure. A single point of failure means that failure in one component will cause the entire website to be unavailable. If the storage unit fails, then the website content will be unavailable.
Failure in a single network card, power supply, or even in a single server will not make the website unavailable. Any of these failures will take one server offline. But because of the server cluster, other servers will still be available to process incoming requests.
REFERENCES
LabSim for Security Pro, Section 9.12.
PreviousNext
You manage your company's website. The Web1 server hosts the website. This server has the following configuration:
- Dual core processor
- Dual power supplies
- RAID 5 volume
- One RAID controller
- Two 1000 Mbps network adapters
Which component is a single point of failure for the website?
Disk controller
Disk storage
Power supply
Network adapter
You manage your company's website. The Web1 server hosts the website. This server has the following configuration:
- Dual core processor
- Dual power supplies
- RAID 5 volume
- One RAID controller
- Two 1000 Mbps network adapters
Which component is a single point of failure for the website?
Disk controller
Disk storage
Power supply
Network adapter
Disk controller
EXPLANATION
A single point of failure means that failure in one component will cause the entire website to be unavailable. In this scenario, the disk controller is a single point of failure. If the disk controller fails, content for the website will be unavailable.
To prevent a single point of failure, provide redundant components. Dual power supplies, multiple network connections, and fault tolerant volumes (RAID 1, RAID 5, or RAID 0 + 1) can all sustain a failure in one component and continue to function.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
A single point of failure means that failure in one component will cause the entire website to be unavailable. In this scenario, the disk controller is a single point of failure. If the disk controller fails, content for the website will be unavailable.
To prevent a single point of failure, provide redundant components. Dual power supplies, multiple network connections, and fault tolerant volumes (RAID 1, RAID 5, or RAID 0 + 1) can all sustain a failure in one component and continue to function.
REFERENCES
LabSim for Security Pro, Section 9.12.
RAID 0+1
RAID 1+0
EXPLANATION
RAID 1+0 combines disk mirroring (1) and disk striping (0). Multiple disks are configured into two mirrored arrays, which are then striped across the other set. RAID 1+0 can sustain multiple drive losses as long as no mirror loses all its drives. RAID 0+1 can also continue to work if both failed disks are in the same set; if a set in each disk fails, data is unavailable.
RAID 5 and RAID 1 can only sustain a loss of a single disk.
REFERENCES
LabSim for Security Pro, Section 9.12.
RAID 1+0
EXPLANATION
RAID 1+0 combines disk mirroring (1) and disk striping (0). Multiple disks are configured into two mirrored arrays, which are then striped across the other set. RAID 1+0 can sustain multiple drive losses as long as no mirror loses all its drives. RAID 0+1 can also continue to work if both failed disks are in the same set; if a set in each disk fails, data is unavailable.
RAID 5 and RAID 1 can only sustain a loss of a single disk.
REFERENCES
LabSim for Security Pro, Section 9.12.
What option is an advantage RAID 5 has over RAID 1?
RAID 5 improves performance over RAID 1.
RAID 5 provides redundancy for the disk controller.
RAID 5 provides redundancy; RAID 1 does not.
RAID 5 continues to operate with a failure in two disks; RAID 1 can only operate with a failure of one disk.
RAID 5 improves performance over RAID 1.
RAID 5 provides redundancy for the disk controller.
RAID 5 provides redundancy; RAID 1 does not.
RAID 5 continues to operate with a failure in two disks; RAID 1 can only operate with a failure of one disk.
RAID 5 improves performance over RAID 1.
EXPLANATION
RAID 5 provides both fault tolerance and improved performance. RAID 1 (mirroring) provides only fault tolerance with no performance benefit.
Both RAID 5 and RAID 1 can only sustain a loss of one disk in the set. Use multiple disk controllers to provide redundancy for the disk controller.
REFERENCES
LabSim for Security Pro, Section 9.12
EXPLANATION
RAID 5 provides both fault tolerance and improved performance. RAID 1 (mirroring) provides only fault tolerance with no performance benefit.
Both RAID 5 and RAID 1 can only sustain a loss of one disk in the set. Use multiple disk controllers to provide redundancy for the disk controller.
REFERENCES
LabSim for Security Pro, Section 9.12
You have a computer with three hard disks.
- A RAID 0 volume uses space on Disk 1 and Disk 2.
- A RAID 1 volume uses space on Disk 2 and Disk 3.
Disk 2 fails. Which of the following is true?
Data on the RAID 0 volume is accessible; data on the RAID 1 volume is not.
Data on both volumes is not accessible.
Data on both volumes is still accessible.
Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.
- A RAID 0 volume uses space on Disk 1 and Disk 2.
- A RAID 1 volume uses space on Disk 2 and Disk 3.
Disk 2 fails. Which of the following is true?
Data on the RAID 0 volume is accessible; data on the RAID 1 volume is not.
Data on both volumes is not accessible.
Data on both volumes is still accessible.
Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.
Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.
EXPLANATION
In this scenario, Disk 2 is shared between both volumes. If Disk 2 fails, the RAID 1 volume is still accessible because RAID 1 (mirrored) volumes can sustain the loss of a single disk. The data on the RAID 0 volume is not accessible. RAID 0 uses striping, which distributes the data evenly between multiple disks. If a single disk fails, the entire volume is lost.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
In this scenario, Disk 2 is shared between both volumes. If Disk 2 fails, the RAID 1 volume is still accessible because RAID 1 (mirrored) volumes can sustain the loss of a single disk. The data on the RAID 0 volume is not accessible. RAID 0 uses striping, which distributes the data evenly between multiple disks. If a single disk fails, the entire volume is lost.
REFERENCES
LabSim for Security Pro, Section 9.12.
You have a web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding.
Which solution should you implement?
Load balancing
NIC teaming
Traffic shaping
QoS
Which solution should you implement?
Load balancing
NIC teaming
Traffic shaping
QoS
Load balancing
EXPLANATION
Load balancing configures a group of servers in a logical group (called a server farm). Incoming requests to the group are distributed to individual members within the group. Load balancing provides fault tolerance if the load balancing mechanism is able to detect when a specific farm member is unavailable, automatically distributing new requests to the available members.
With NIC teaming, two or more physical connections to the same network are logically grouped (or bonded). If one NIC fails, the second NIC with a connection to the same network can still be used. NIC teaming provides redundancy for a network adapter, but not for other components, such as hard drives.
A traffic shaper (also called a bandwidth shaper) is a device that is capable of modifying the flow of data through a network in response to network traffic conditions. Quality of Service (QoS) refers to a set of mechanisms that tries to guarantee timely delivery or minimal delay of important or time-sensitive communications. QoS is particularly important when implementing Voice over IP (VoIP), Video over IP, or online gaming where delay or data loss make the overall experience unacceptable.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
Load balancing configures a group of servers in a logical group (called a server farm). Incoming requests to the group are distributed to individual members within the group. Load balancing provides fault tolerance if the load balancing mechanism is able to detect when a specific farm member is unavailable, automatically distributing new requests to the available members.
With NIC teaming, two or more physical connections to the same network are logically grouped (or bonded). If one NIC fails, the second NIC with a connection to the same network can still be used. NIC teaming provides redundancy for a network adapter, but not for other components, such as hard drives.
A traffic shaper (also called a bandwidth shaper) is a device that is capable of modifying the flow of data through a network in response to network traffic conditions. Quality of Service (QoS) refers to a set of mechanisms that tries to guarantee timely delivery or minimal delay of important or time-sensitive communications. QoS is particularly important when implementing Voice over IP (VoIP), Video over IP, or online gaming where delay or data loss make the overall experience unacceptable.
REFERENCES
LabSim for Security Pro, Section 9.12.
You manage a server that runs your company website. The web server has reached its capacity, and the number of client requests is greater than the server can handle.
You would like to find a solution so that a second server can respond to requests for website content.
Which solution should you implement?
Ethernet bonding
QoS
Load balancing
Traffic shaper
You would like to find a solution so that a second server can respond to requests for website content.
Which solution should you implement?
Ethernet bonding
QoS
Load balancing
Traffic shaper
Load balancing
EXPLANATION
Load balancing configures a group of servers in a logical group (called a server farm). Incoming requests to the group are distributed to individual members within the group. Incoming requests can be distributed evenly between group members or unevenly based on additional criteria, such as server capacity. The primary goal of load balancing is to improve performance by configuring multiple devices to respond as one.
A traffic shaper (also called a bandwidth shaper) is a device that is capable of modifying the flow of data through a network in response to network traffic conditions. Quality of Service (QoS) refers to a set of mechanisms that tries to guarantee timely delivery or minimal delay of important or time-sensitive communications. QoS is particularly important when implementing Voice over IP (VoIP), Video over IP, or online gaming--programs in which delay or data loss make the overall experience unacceptable.
With Ethernet bonding (also called NIC teaming), two or more physical connections to the same network are logically grouped (or bonded). Data is divided and sent on multiple interfaces, effectively increasing the speed at which the device can send and receive on the network.
REFERENCES
LabSim for Security Pro, Section 9.12.
EXPLANATION
Load balancing configures a group of servers in a logical group (called a server farm). Incoming requests to the group are distributed to individual members within the group. Incoming requests can be distributed evenly between group members or unevenly based on additional criteria, such as server capacity. The primary goal of load balancing is to improve performance by configuring multiple devices to respond as one.
A traffic shaper (also called a bandwidth shaper) is a device that is capable of modifying the flow of data through a network in response to network traffic conditions. Quality of Service (QoS) refers to a set of mechanisms that tries to guarantee timely delivery or minimal delay of important or time-sensitive communications. QoS is particularly important when implementing Voice over IP (VoIP), Video over IP, or online gaming--programs in which delay or data loss make the overall experience unacceptable.
With Ethernet bonding (also called NIC teaming), two or more physical connections to the same network are logically grouped (or bonded). Data is divided and sent on multiple interfaces, effectively increasing the speed at which the device can send and receive on the network.
REFERENCES
LabSim for Security Pro, Section 9.12.
Sets found in the same folder
Other sets by this creator
Verified questions
Other Quizlet sets
1/4