- Data Loss Prevention
- Data Loss Detection
- Data Classification, Labeling, and Tagging
- Obfuscation
- Anonymization
- Encrypted vs. Unencrypted
- Data Life Cycle
- Data Inventory and Mapping
- Data Integrity Management
- Data Storage, Backup, and Recovery
- Exam Preparation Tasks
- Review All Key Topics
- Define Key Terms
- Review Questions
Review All Key Topics
Review the most important topics in this chapter, noted with the Key Topic icon in the outer margin of the page. Table 4-4 lists these key topics and the page number on which each is found.
Table 4-4 Key Topics for Chapter 4
Key Topic Element |
Description |
Page Number |
---|---|---|
Controlling the Use of USB Devices |
126 |
|
Table 4-1 |
Advantages and Disadvantages of RDP |
127 |
List |
VDI models |
128 |
VDI Streaming and Centralized VDI |
128 |
|
List |
VDI attributes |
131 |
List |
Data masking methods |
132 |
Section |
Data Life Cycle |
132 |
Paragraph |
Backup types |
135 |
Table 4-2 |
Backup Types Comparison |
136 |
Grandfather/Father/Son Backup Rotation Scheme |
137 |
|
List |
Electronic backup terms and solutions |
138 |
RAID 0 |
139 |
|
RAID 1 |
139 |
|
RAID 3 |
140 |
|
RAID 5 |
140 |
|
RAID 10 |
141 |
|
Table 4-3 |
RAID Types |
141 |