NT1230 Unit 2 Assignment 1 Disk Redundancy Research 1. What does RAID stand for? RAID stands for either redundant array of independent disks or redundant array of inexpensive disks. 2. When would we use RAID?
Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I. Maintains a database of targets and initiators J. Disk array that does not use RAID Multiple Choice: Select one or more correct answers for each of the following questions. 1. Which of the following statements are true of striped volumes?
However, switches filter data according to the MAC address. This can reduce congestion and decrease the collision domain (Ciccarelli, et al 2013). Switches support management capabilities and some provide built-in web servers for management over the Internet (Ciccarelli, et al 2013). Switches allow the network to be grouped into segments and can limit the amount of broadcast traffic that is propagated between segments (Ciccarelli, et al 2013). Because of their sophistication, switches can be more expensive, difficult to configure, and can increase the complexity of a network (Ciccarelli, et al 2013).
NTFS file system is used to support larger hard drives and is better for security. You’re able to encrypt and permissions that restrict access by unauthorized users. FAT 32 system files lack the security that NFTS provides. FAT32 allows any user that accesses the machine to view any files without restrictions. FAT32 file systems have a limited amount of disk size.
Internal Monitoring Insider Threats Internal monitoring starts with monitoring access and usage of an organizations network. This is because insider threats are a very serious threat. Insider threats can come in the form of both intentional and unintentional misuse of the system. An intentional misuse to the system can come from a disgruntled employee who may seek to damage the company or find personal gain from exploiting data. Unintentional misuse happens when users are not properly trained on the system.
a. cost of goods sold b. depreciation expense c. amortization expense d. None of these 5. Paid-in capital accounts are translated using the historical exchange rate under: a. the current rate method only. b. the temporal method only. c. both the current rate and temporal methods. d. neither the current rate nor temporal methods.
It takes a computer spitting out lines and lines of codes into a usable interface for the input/output of data. Exercise 3.1.3: Physical, DataLink, Network, and Transport Exercise 3.1.4: If a model is too general, data might not be transferred and encrypted as it should be, that is why there is specific layers to each individual model. If a model is too granular, that can alienate a lot of hardware and make the model less adaptable and not as widely communicating as other models. Exercise 3.1 Review 1. because datalink and transport are integral layers involved in describing a network standard 2. OSI was created by the international Organization for Standardization, in an attempt to create an open networking model.