- Shuffle
Toggle On
Toggle Off
- Alphabetize
Toggle On
Toggle Off
- Front First
Toggle On
Toggle Off
- Both Sides
Toggle On
Toggle Off
- Read
Toggle On
Toggle Off
Card Range To Study
through
Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
- Share
- Export
- Clone
20 Cards in this Set
- Front
- Back
Protection against harmful code involves more than just installing anti-malware software. True | True | |
When implementing anti-malware software on a network, one of your most important decisions is where to install the software. True | False | |
An anti-malware policy is meant to protect the network from damage and downtime. True | True | |
The goal of fault-tolerant systems is to prevent failures from progressing to faults. True | False | |
Generators provide surge protection. True | False | |
____ is intended to eliminate single points of failure. a. Availability | b) redundancy | |
A program that disguises itself as something useful but actually harms your system is called a ____. a. virus | d) trojan horse | |
____ are programs that run independently and travel between computers and across networks. a. Viruses | b) worms | |
A ____ is a program that runs automatically, without requiring a person to start or stop it. a. virus | c) bot | |
A(n) ____ virus disguises itself as a legitimate program to prevent detection. a. stealth | a) stealth | |
A(n) ____ virus changes its characteristics every time it is transferred to a new system. a. stealth | d) polymorphic | |
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database. a. Integrity checking | c) signature | |
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes. a. Integrity checking | a) integrity checking | |
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior. a. Integrity checking | d) heuristic | |
A(n) ____ is a deviation from a specified level of system performance for a given period of time. | b) failure | |
Power that is free from noise is called “____” power. a. clear | b) clean | |
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. a. standby | d) online | |
Mesh topologies and ____ topologies are good choices for highly available enterprise networks. a. star | b) SONET ring | |
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response. a. Redundancy | d) load balancing | |
____ is a fault-tolerance technique that links multiple servers together to act as a single server. a. Clustering | a) clustering |
Which virus disguises itself as a legitimate prevention?
What is a distinct network of storage devices that communicate directly with each other and with other networks?
What is a specialized storage device or group of storage devices that provides centralized fault tolerant data storage for a network?
Term POLYMORPHIC | Definition A(n) ____ virus changes its characteristics every time it is transferred to a new system. |
Term NAS | Definition ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network. |