contributes to the assurance of confidentiality rather than integrity.
There are many ways to capture log information: through the application
layer, network layer, operating systems layer, etc.; however, there is no
log integrity advantage in capturing events in the operating systems
layer. If it is a highly mission-critical information system, it may be
nice to run the system with a dual log mode. Having logs in two different
storage devices will primarily contribute to the assurance of the
availability of log information, rather than to maintaining its integrity.
292
、
During the requirements definition phase for a database application,
performance is listed as a top priority. To access the DBMS files, which
of the following technologies should be recommended for optimal I/O
performance?
A
、
Storage area network (SAN)
B
、
Network Attached Storage (NAS)
C
、
Network file system (NFS v2)
D
、
Common Internet File System (CIFS)
ANSWER:A
NOTE:In contrast to the other options, in a SAN comprised of computers, FC
switches or routers and storage devices, there is no computer system
hosting and exporting its mounted file system for remote access, aside
from special file systems. Access to information stored on the storage
devices in a SAN is comparable to direct attached storage, which means
that each block of data on a disk can be addressed directly, since the
volumes of the storage device are handled as though they are local, thus
providing optimal performance. The other options describe technologies in
which a computer (or appliance) shares its information with other systems.
To access the information, the complete file has to be read.
293
、
At a hospital, medical personal carry handheld computers which
contain patient health data. These handheld computers are synchronized
with PCs which transfer data from a hospital database. Which of the
following would be of the most importance?
A
、
The handheld computers are properly protected to prevent loss of
data confidentiality, in case of theft or loss.
B
、
The employee who deletes temporary files from the local PC, after
usage, is authorized to maintain PCs.
C
、
Timely synchronization is ensured by policies and procedures.
D
、
The usage of the handheld computers is allowed by the hospital
policy.
ANSWER:A