• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Protection against harmful code involves more than just installing anti-malware software.

True
False
True
When implementing anti-malware software on a network, one of your most important decisions is where to install the software.

True
False
False
An anti-malware policy is meant to protect the network from damage and downtime.

True
False
True
The goal of fault-tolerant systems is to prevent failures from progressing to faults.

True
False
False
Generators provide surge protection.

True
False
False
____ is intended to eliminate single points of failure.

a. Availability
b. Redundancy
c. Contingency
d. Integrity
b) redundancy
A program that disguises itself as something useful but actually harms your system is called a ____.

a. virus
b. worm
c. bot
d. Trojan horse
d) trojan horse
____ are programs that run independently and travel between computers and across networks.

a. Viruses
b. Worms
c. Bots
d. Trojan horses
b) worms
A ____ is a program that runs automatically, without requiring a person to start or stop it.

a. virus
b. worm
c. bot
d. Trojan horse
c) bot
A(n) ____ virus disguises itself as a legitimate program to prevent detection.

a. stealth
b. encrypted
c. time dependent
d. polymorphic
a) stealth
A(n) ____ virus changes its characteristics every time it is transferred to a new system.

a. stealth
b. encrypted
c. time dependent
d. polymorphic
d) polymorphic
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.

a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
c) signature
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
a) integrity checking
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.

a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
d) heuristic
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
Choose one answer.
a. fault
b. failure
c. error
d. hoax
b) failure
Power that is free from noise is called “____” power.

a. clear
b. clean
c. filtered
d. white
b) clean
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

a. standby
b. offline
c. offsite
d. online
d) online
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

a. star
b. SONET ring
c. bus
d. ring
b) SONET ring
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.

a. Redundancy
b. Failover
c. RAID
d. Load balancing
d) load balancing
____ is a fault-tolerance technique that links multiple servers together to act as a single server.

a. Clustering
b. Grouping
c. Mirroring
d. Duplicating
a) clustering