Why is RAID-0 not appropriate as a form of fault tolerance?

12. RAID-10 is a combination of which two technologies? 13. If you create a RAID-5 pack out of five 36GB disks, how much storage will be available? 14. What are the two methods used to perform offsite storage? 15. What is the difference between backup and archiving? 16. What are the two common types of clustering? Answers 1. The four major causes for loss are human error, routine failure, crimes, and environmental events. 2. Having a good archiving policy is the best way to recover from the effects of human error. 3. The hard disk is the most likely component to fail in a computer.

4. The hard disk is the most difficult component to replace in a computer.

5. Deployment testing is the easiest way to avoid software bugs and compatibility problems.

6. Using multiple circuits from different ISPs will help you recover from a circuit failure.

7. Strong border security, permissions security, and offline backup are the best ways to

minimize the damage caused by hackers.

8. Tape backups are the most common form of fault tolerance.

9. An incremental backup contains all the files changed since the last incremental backup,

while a differential backup contains the files changed since the last full system backup. 10. Humans cause the majority of failures in a tape backup system. 11. RAID-0 actually makes failure more likely rather than less likely.

12. RAID-1 and RAID-0 are combined in RAID-10.

13. Since you have to leave 1 disk for parity information, the storage available would be 5-1

x 36GB = 144GB. 14. Physically moving offline backup media to another location and transmitting data to another facility via a network are the two methods used to perform offsite storage. 15. Backup is the process of making a copy of every file for the purpose of restoration. Archiving is the process of retaining a copy of every version of all files created by users for the purpose of restoring individual files in case of human error. 16. The two common types of clustering are fail-over clustering and load balancing. Terms to Know • archive marking • archiving • BIOS Basic Input Output System • circuit • combination • disk packs • fail-over clustering • fault tolerance • file synchronization • Load balancing • Mean Time Between Failures MTBF • offline • online • RAID • removable media • stateless protocol

Chapter 10: Windows Security

This chapter will provide you with all the information you need to understand the major Windows security mechanisms in the Windows NT2000XP family, along with some management advice and practical walkthroughs. But no single chapter, and perhaps not even a single book, could cover the wide array of Windows security mechanisms in complete detail. Once you’ve read this chapter and used the information presented herein to design a security architecture for your network, consult the Internet RFCs upon which most of these standards are based for technical details of their operation. Microsoft’s Resource Kits and Training Kits are the authoritative source for the Microsoft implementation of these mechanisms and should be consulted for configuration- specific information. Windows Local Security Windows security is based on user authentication. Before you can use a Windows computer, you must supply a username and a password. The logon prompt provided by the WinLogon process identifies you to the computer, which then provides access to resources you are allowed to use and denies access to things you aren’t. This combination of a user identity and password is called a user account. logon prompt The interface through which users identify themselves to the computer. user account The association between a user account name, a password, and a security identifier. Note Windows 9598Me has no significant security mechanisms to speak of, and these systems are not in themselves secure, so no information in this chapter applies to them. It is possible for a computer to be set up to automatically log on for you, using stored credentials or an account that has an empty password as is the case by default in Windows XP Home, but an account is still logged on, and the security that applies to that account is used to manage permissions for that user session. Windows also provides Security Groups. When a user account is a member of a security group, the permissions that apply to the security group also apply to the user account. For example, if a user is a member of the “Financial” security group, then the permissions of the Financial security group are applied to the user account. User accounts may be members of