Briefly describe critical nodes and provide three examples.
What will be an ideal response?
Unlike critical assets, critical nodes are very much unique to IT equipment: servers, routers, workstations, printers, and so forth. Identifying critical nodes is usually much clearer than identifying critical assets because of the IT nature of critical nodes and the fact that the IT department is always going to be painfully aware of what nodes are critical. Here are a few examples of critical nodes:
• A file server that contains critical project files
• A single Web server
• A single printer (assuming printed output is critical to the organization)
• An edge router
You might also like to view...
In addition to reserving (or declaring) variables in a program, you also can declare named constants.
Answer the following statement true (T) or false (F)
What does the tcpdump host 192.168.1.100 command do?
A. It only captures traffic originating from and destined to 192.168.1.100. B. It only captures traffic originating from 192.168.1.100. C. It only captures traffic destined to 192.168.1.100. D. It only captures traffic destined to the default host 192.168.1.1.
How will the spreadsheet model help Mr. Madison monitor key information? How would his business benefit from being able to retrieve key information on a regular basis?
What will be an ideal response?
All cells in a range share all or part of their borders.
Answer the following statement true (T) or false (F)