Appendix B. Memory Tables Answer Key

Chapter 1

As part of determining how critical an asset is, you need to understand the following terms:

Image Maximum tolerable downtime (MTD): The maximum amount of time that an organization can tolerate a single resource or function being down. This is also referred to as maximum period time of disruption (MPTD).

Image Mean time to repair (MTTR): The average time required to repair a single resource or function when a disaster or disruption occurs.

Image Mean time between failure (MTBF): The estimated amount of time a device will operate before a failure occurs. This amount is calculated by the device vendor. System reliability is increased by a higher MTBF and lower MTTR.

Image Recovery time objective (RTO): The shortest time period after a disaster or disruptive event within which a resource or function must be restored to avoid unacceptable consequences. RTO assumes that an acceptable period of downtime exists. RTO should be smaller than MTD.

Image Work recovery time (WRT): The difference between RTO and MTD, which is the remaining time that is left over after the RTO before reaching the maximum tolerable.

Image Recovery point objective (RPO): The point in time to which the disrupted resource or function must be returned.

Image

Table 1-4 Administrative (Management) Controls

Image
Image

Table 1-5 Logical (Technical) Controls

Image
Image

Table 1-6 Physical Controls

Chapter 2

Image

Table 2-1 RAID

Image

Table 2-2 Confidentiality, Integrity, and Availability Potential Impact Definitions

Chapter 3

Image

Table 3-4 Symmetric Algorithm Strengths and Weaknesses

Image

Table 3-5 Asymmetric Algorithm Strengths and Weaknesses

Image

Table 3-6 Symmetric Algorithms Key Facts

Image
Image
Image

Table 3-7 Protection Requirements for Cryptographic Keys

Image

Table 3-8 Fire Extinguisher Classes

Chapter 4

Image
Image

Table 4-1 Common TCP/UDP Port Numbers

Image

Table 4-2 Classful IP Addressing

Image

Table 4-3 Private IP Address Ranges

Image

Table 4-4 WPA and WPA2

Image

Table 4-5 Twisted-Pair Categories

Image

Table 4-6 Selected Fiber Specifications

Image

Table 4-7 Ethernet Implementations

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset