Mod 2 - Servers

studied byStudied by 24 people
5.0(1)
Get a hint
Hint

SATA

1 / 82

flashcard set

Earn XP

Description and Tags

Mod 2 <3

83 Terms

1

SATA

A hard drive interface providing faster transfer times. it has thinner and more flexible cabling, and easier plug-and-play connections.

New cards
2

Serial bursts

In what way does SATA transfer data.

New cards
3

Network-Attached Storage (NAS)

A specialized storage device or group of storage devices providing centralized fault-tolerant data storage for a network.

New cards
4

Storage-Area Network (SAN)

A Specialized high-speed network of storage devices and switches connected to servers or computer systems. Supports centralized storage management.

New cards
5

Fibre Channel

Connects devices within the SAN and also connects the SAN to other networks.

New cards
6

Hardware RAID

Set of disks and a separate disk controller.

New cards
7

Software RAID

Software to implement and control RAID over virtually any type of hard disk.

New cards
8

RAID 0

Offers striping with no parity or mirroring.

New cards
9

RAID 1

Carries out mirroring or duplexing wherein the data present on a disk is copied onto one disk or a pair of disks.

New cards
10

RAID 5

Both data and parity information are striped across three or more drives. Good for large data transfers.

New cards
11

RAID 6

Two parity blocks are written in this level to help in the data recovery process. Good for small data transfers.

New cards
12

RAID 10

Minimum of four physical hard disks required, combines two raids for both performance and fault-tolerance.

New cards
13

Inputting the data

First even in the information processing cycle.

New cards
14

Input Device

Any peripheral device helping feed data and control signals to a compute system.

New cards
15

Output Device

Any peripheral hardware connected to the computer either using cables or over a wireless network that emits somthin.

New cards
16

Plotter

Creates a hard copy rendition of a digitally rendered design. Draws an image using a series of straight lines.

New cards
17

Blade technology

Allows for saving space and increasing the efficiency of the servers.

New cards
18

Backplane

Provides a central connection point for each blade.

New cards
19

Virtualization (Abstraction)

Separates Hardware from the Software

New cards
20

Mimic Physical Machines

VM’s have a BIOS, hard disks, memory, CPUs, OSs, and applications because they __________________

New cards
21

Hypervisor

Software that runs the virtual machines. It controls the interaction between the virtual machines and the hardware that is in the physical device.

New cards
22

Type 1

Referred to as bare-metal, runs directly on top of the system hardware.

New cards
23

Type 2

Referred to as hosted, runs on a hosted operating system that provides the virtualization services like input/output, device support, memory management, etc.

New cards
24

Examples of Type 1

XenServer, Microsoft Hyper-V, and VMware’s ESXi

New cards
25

Examples of Type 2

Oracle’s VirtualBox and VMWare’s Workstation

New cards
26

Application cells and containers.

Used to create a sandbox for applications, providing portability of the application as well as isolation from the OS.

New cards
27

Virtual Trusted Platform Module

Used to provide a high degree of security. Allows programs to interact with a TPM in a virtual system.

New cards
28

Trusted Platform Module

Uses a secure storage functionality and its underlying cryptographic methods are available to operating systems and applications.

New cards
29

Server Virtualization

Most common type of virtualization. It is the partitioning of a physical server into smaller virtual servers.

New cards
30

Host Server Operating System

Multiple operating systems installed on VMs can reside on the same host server.

New cards
31

Host Server Hardware

Faster and higher-capacity hard drives, better cooling, and a UPS

New cards
32

Server consolidation

Condense multiple physical servers into one server running many virtual machines.

New cards
33

Operating-System-Level Virtualization

Referred to as container virtualization, Single shared OS to host many users simultaneously.

New cards
34

Hardware Emulation

Well-established form of virtualization. Software presents a software representation of the underlying hardware an operating system would typically interact with.

New cards
35

Client Virtualization

Defined as a virtualization technology used to separate a desktop computer environment from the physical device used to access it. Lets multiple end users make use of a single host device.

New cards
36

Presentation Virtualization

Referred to as Terminal Services/Remote Desktop Services, most mature and most widely used client virtualization architecture. Applications run on a shared Windows servers hosted in a remote location. Only the applications user interface presented to the users desktop.

New cards
37

Virtual Desktop Infrastructure

Referred to as Server-Hosted Virtual Desktops, Shared infrastructure hosted in a central data center. Uses a standard desktop operating system running on a hypervisor.

New cards
38

Intelligent Desktop Virtualization

Referred to as Distributed-Desktop Virtualization. Retains a conventional desktop PC at the endpoint running a locally installed client hypervisor.

New cards
39

Application Virtualization/Streaming

Applications are packaged so they run inside a virtualization layer controlling access to the underlying operating system. Removing OS specific dependencies, extends application virtualization to the data center.

New cards
40

Cloud Computing

A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services, that can be rapidly provisioned and released with minimal management effort or service provider interaction.

New cards
41

Abstraction

Process in which specific details are hidden or ignored to simplify or generalize something.

New cards
42

On-Demand Self-Service

A consumer can get access to computing capabilities such as storage and server time is required, without any human interaction with a cloud service provider.

New cards
43

Broad Network Access

Hosted application should be reachable to any network device. Available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick clients.

New cards
44

Resource Pooling

Enables users to enter and use data within business management software hosted on the cloud at the same time, from any location and at any time. Multitenant model

New cards
45

Measured Service

Consumers only pay for the resources they consume.

New cards
46

Rapid Elasticity

Cloud is flexible, scalable, and users can quickly and easily add or remove software features and other resources.

New cards
47

Software as a Service (SaaS)

Different types of applications are offered to the customers as a service on-demand.

New cards
48

Platform as a Service (PaaS)

A layer of software or development environment is encapsulated and offered as a service over which other higher levels of services can be built. Generally used by developers.

New cards
49

Infrastructure as a Service (IaaS)

Basic computing capabilities and storage as standardized services over the network.

New cards
50

Public Cloud

Cloud infrastructure is open for use by the general public. Gives each individual clients an attractive low-cost, “pay-as-you-go” model.

New cards
51

Private Cloud

Built exclusively for a single enterprise, addresses concerns on data security and offer greater control.

New cards
52

On-premise Private Cloud

Called internal clouds, are hosted within one’s own data center, limited in size and scalability.

New cards
53

Externally hosted Private Cloud

Facilitated with an exclusive cloud environment with a full guarantee of privacy and security. Hosted externally with a cloud provider.

New cards
54

Hybrid Cloud

Combination of private and public clouds.

New cards
55

Community Cloud

Multi-tenant cloud service model, it is a hybrid form of private cloud built and operated specifically for a targeted organization and communities.

New cards
56

Personal Cloud

Small server in a a home or small network that can be accessed over the internet.

New cards
57

Advantages of cloud computing

Cost Efficient, Unlimited Storage, Backup and Recovery, Automatic Software Integration, Easy Access to Information, Quick Deployment, and Scalability.

New cards
58

Disaster

A sudden, unplanned event that causes great damage and loss to an organization.

New cards
59

Disaster Recovery

Your IT response to a sudden, unplanned event, which will enable your organization to continue critical business functions until normal IT-related services can resume.

New cards
60

Continuity Planning

The ability to continue critical functions and processes during and after an emergency event.

New cards
61

Contingency Planning

Information systems and provides the steps needed to recover the operation of all or part of designated information systems at an existing or new location in an emergency.

New cards
62

Continuity of Operations Plan (COOP)

Provides procedures and guidance to sustain an organizations MEFs at an alternate site for up to 30 days.

New cards
63

Disaster Recovery Plan (DRP)

Provides procedures for relocating information systems operations to an alternate location.

New cards
64

Information System Contingency Plan (ISCP)

Provides procedures and capabilities for recovering an information system.

New cards
65

Cyber Incident Response Plan (CISR)

Provides procedures for mitigating and correcting a cyber-attack, such as a virus, worm, or trojan.

New cards
66

Business Continuity Plan (BCP)

Provides procedures for sustaining mission/business operations while recovering from a significant disruption.

New cards
67

Occupant Emergency Plan (OEP)

Provides coordinated procedures for minimizing loss of life or injury and protecting property damage in response to a physical threat.

New cards
68

Information

Your organization’s most valuable asset.

New cards
69

Data Backup Strategy

Goal of all data backup jobs is to ensure lost data, no matter how it got lost, can be recovered quickly, efficiently and as completely as possible.

New cards
70

Full Data Backup

Starting point for all other backups, contains all files and folders. Entire data set is copied and afterwards unchecks the file’s archive bit.

New cards
71

Incremental Data Backup

Processes only new files or files changed since the last full or incremental backup. Saves only those files whose archive bit is checked, then unchecks the bit.

New cards
72

Differential Data Backup

Copies only selected files and folders changed since the last full backup as indicated by the archive flag, does not uncheck the archive flag for files.

New cards
73

Faster restoration of data

Differential backups have ________________ as compared to incremental backups.

New cards
74

Priority Restoration Plan

Certain network systems and devices are of primary consideration in a contingency backup and restoration plan, as such this may be a requirement to follow during an established contingency plan.

New cards
75

Cold Site

Consists of a facility with adequate space and infrastructure to support the IT system. Does not contain IT equipment.

New cards
76

Warm Site

Partially equipped office spaces containing some or all of the system hardware, software, telecommunications, and power sources. May need to be prepared before receiving the system and recovery personnel.

New cards
77

Hot Site

Office spaces appropriately sized to support system requirements and fully configured, ready to operate in a few hours. Only missing data and personnel.

New cards
78

Mirrored Site

One site is equipped and configured exactly like the primary site. It is a redundant environment owned by the organization.

New cards
79

Mobile Hot Site

Large truck or trailer turned into a data processing or systems allowing for immediate processing.

New cards
80

Multiple Processing Centers

Able to move all data processing from one facility to another in a matter of seconds when an interruption is detected.

New cards
81

Hotbox/Recovery box

Tool to help aid in the process for disaster recovery, up-to-date copy of the disaster recovery plan, all server software infrastructure components, and the recovery CDs.

New cards
82

Unscheduled Service Interruptions (USI)

Unscheduled network, equipment, or application outages or degradations caused by such things as environment problems, equipment malfunctions, system crashes, etc.

New cards
83

Uninterruptable Power Supplies (UPS)

Critical component of the server room’s power-support system. A ‘battery backup’ maintains a continuous supply of electrical power to all connected equipment in the event of a power irregularities.

New cards

Explore top notes

note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 149 people
... ago
4.6(5)
note Note
studied byStudied by 17 people
... ago
5.0(3)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(2)
note Note
studied byStudied by 33 people
... ago
5.0(1)
note Note
studied byStudied by 81 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (26)
studied byStudied by 4 people
... ago
4.5(2)
flashcards Flashcard (31)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 14 people
... ago
5.0(2)
flashcards Flashcard (72)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (100)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 7 people
... ago
5.0(2)
flashcards Flashcard (50)
studied byStudied by 12 people
... ago
5.0(2)
flashcards Flashcard (31)
studied byStudied by 1 person
... ago
5.0(1)
robot