Appendix A. Memory Tables

Chapter 1

As part of determining how critical an asset is, you need to understand the following terms:

Image Maximum tolerable downtime (MTD): The _______ amount of time that an organization can tolerate a single resource or function being down. This is also referred to as _______.

Image Mean time to repair (MTTR): The _______ required to _______ a single resource or function when a disaster or disruption occurs.

Image Mean time between failure (MTBF): The _______ a device will operate before a _______ occurs. This amount is calculated by the _______. System reliability is increased by a _______ MTBF and _______ MTTR.

Image Recovery time objective (RTO): The _______ after a disaster or disruptive event within which a resource or function must be _______ to avoid unacceptable consequences. RTO assumes that an acceptable period of downtime exists. RTO should be smaller than _______.

Image Work recovery time (WRT): The _______ between RTO and MTD, which is the remaining time that is left over after the RTO before reaching the maximum tolerable.

Image Recovery point objective (RPO): The _______ to which the disrupted resource or function must be _______.

Image

Table 1-4 Administrative (Management) Controls

Image
Image

Table 1-5 Logical (Technical) Controls

Image
Image

Table 1-6 Physical Controls

Chapter 2

Image
Image

Table 2-1 RAID

Image

Table 2-2 Confidentiality, Integrity, and Availability Potential Impact Definitions

Chapter 3

Image

Table 3-4 Symmetric Algorithm Strengths and Weaknesses

Image

Table 3-5 Asymmetric Algorithm Strengths and Weaknesses

Image

Table 3-6 Symmetric Algorithms Key Facts

Image
Image
Image

Table 3-7 Protection Requirements for Cryptographic Keys

Image

Table 3-8 Fire Extinguisher Classes

Chapter 4

Image
Image

Table 4-1 Common TCP/UDP Port Numbers

Image

Table 4-2 Classful IP Addressing

Image

Table 4-3 Private IP Address Ranges

Image

Table 4-4 WPA and WPA2

Image

Table 4-5 Twisted-Pair Categories

Image

Table 4-6 Selected Fiber Specifications

Image

Table 4-7 Ethernet Implementations

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.35.158