Chapter Title
Related domains:
1.0 General Security Concepts 12% 2.0 Threats, Vulnerabilities, and Mitigations 22% 3.0 Security Architecture 18%
Related sub-domains
1.2 Summarize fundamental security concepts. 2.4 Given a scenario, analyze indicators of malicious activity 3.1 Compare and contrast security implications of different architecture models. 3.4 Explain the importance of resilience and recovery in security architecture
continuity of operations architecture model considerations architecture model considerations Redundant Array of Inexpensive Disks RAID backups replication journaling backup frequency Recovery Point Objectives RPO Recovery Time Objectives RTO snapshots VM images nearline backups cloud backup considerations non-persistance restoration to last-known good configuration live-boot media scalability site resilience capacity planning testing resilience and recovery control designs physical security control category
watch professor messor’s videos
continue from 281
Survey
Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.
Questions
While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.
Read
Focus on answering the questions, come up with more as necessary.
Write
Annotate thoughts and ideas Answer qeustions
Recite
Go back over appropriate sections
Reflect
How does this currently fit with what you know? How would you teach this to someone else?