Resilience and Physical Security 1. List 4 common elements in designs for redundancy. 2. What is RAID 5 and what are its
Posted: Fri Jul 08, 2022 6:38 am
Resilience and Physical Security
1. List 4 common elements in designs for redundancy.
2. What is RAID 5 and what are its advantages anddisadvantages?
3. List and explain two categories of scalability and theiradvantages.
4. List all steps in site restoration.
Cloud and Virtualization Security
5. What is cloud computing? What are the benefits of thecloud?
6. What are three major cloud service models?
7. What are three key security considerations when working withcloud storage?
8. What are two different approaches of CASBs?
Endpoint Security
9. List four common methods to detect malicious software andapplications.
10. How does FDE work? What kinds of potential downfalls doesdisk encryption bring?
11. What kinds of issues should security analysts be aware ofwhen dealing with IoT devices?
12. What security constraints do you need to take into accountwhen you consider security for embedded systems?
1. List 4 common elements in designs for redundancy.
2. What is RAID 5 and what are its advantages anddisadvantages?
3. List and explain two categories of scalability and theiradvantages.
4. List all steps in site restoration.
Cloud and Virtualization Security
5. What is cloud computing? What are the benefits of thecloud?
6. What are three major cloud service models?
7. What are three key security considerations when working withcloud storage?
8. What are two different approaches of CASBs?
Endpoint Security
9. List four common methods to detect malicious software andapplications.
10. How does FDE work? What kinds of potential downfalls doesdisk encryption bring?
11. What kinds of issues should security analysts be aware ofwhen dealing with IoT devices?
12. What security constraints do you need to take into accountwhen you consider security for embedded systems?