Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
3 Cards in this Set
- Front
- Back
Visit :
www.hwguiders.com |
CMGT 244
Intro to IT Security What is the difference between a DRP and a BCP? What is the purpose of a Disaster Recovery Plan (DRP)? What are the key elements of a DRP? What are the five methods of testing a DRP? Why does a DRP require testing? Establishing a Secure Computer Room Explain the seven layers of the OSI model in detail At which layers do packet-filtering routers and firewalls reside? And how do pack-filtering routers and firewalls protect a network? Explain the concept of cryptography. What are the various types of cryptography? Summarize the mechanisms that make up a strong cryptosystem and how the cryptosystem could be used to secure a system. Information Security Policy, All DQs Included |
|
Visit :
www.hwguiders.com |
CMGT 244
Intro to IT Security What is the difference between a DRP and a BCP? What is the purpose of a Disaster Recovery Plan (DRP)? What are the key elements of a DRP? What are the five methods of testing a DRP? Why does a DRP require testing? Establishing a Secure Computer Room Explain the seven layers of the OSI model in detail At which layers do packet-filtering routers and firewalls reside? And how do pack-filtering routers and firewalls protect a network? Explain the concept of cryptography. What are the various types of cryptography? Summarize the mechanisms that make up a strong cryptosystem and how the cryptosystem could be used to secure a system. Information Security Policy, All DQs Included |
|
Visit :
www.hwguiders.com |
CMGT 244
Intro to IT Security What is the difference between a DRP and a BCP? What is the purpose of a Disaster Recovery Plan (DRP)? What are the key elements of a DRP? What are the five methods of testing a DRP? Why does a DRP require testing? Establishing a Secure Computer Room Explain the seven layers of the OSI model in detail At which layers do packet-filtering routers and firewalls reside? And how do pack-filtering routers and firewalls protect a network? Explain the concept of cryptography. What are the various types of cryptography? Summarize the mechanisms that make up a strong cryptosystem and how the cryptosystem could be used to secure a system. Information Security Policy, All DQs Included |