Chapter 14 quiz Flashcards

1
Q

T/F: Protection against harmful code involves more than just installing anti-malware software.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F: When implementing anti-malware software on a network, one of your most important decisions is where to install the software.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: An anti-malware policy is meant to protect the network from damage and downtime.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: The goal of fault-tolerant systems is to prevent failures from progressing to faults.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: Generators provide surge protection.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is intended to eliminate single points of failure.

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A program that disguises itself as something useful but actually harms your system is called a ____.

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ are programs that run independently and travel between computers and across networks.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is a program that runs automatically, without requiring a person to start or stop it.

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A(n) ____ virus disguises itself as a legitimate program to prevent detection.

A

stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ____ virus changes its characteristics every time it is transferred to a new system.

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.

A

signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

A

integrity checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.

A

heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ____ is a deviation from a specified level of system performance for a given period of time.

A

failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Power that is free from noise is called “____” power.

A

clean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

A

online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

A

SONET ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.

A

load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which RAID offers the best performance.

A

RAID level 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which RAID provides redundancy through a process called disk mirroring.

A

RAID level 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In which RAID does parity error checking occur when data is written across the disk array.

A

RAID level 3

23
Q

____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network

A

NAS

24
Q

____ are distinct networks of storage devices that communicate directly with each other and with other networks.

A

SANs

25
Q

____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

A

optical media

26
Q

An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.

A

bit

27
Q

Many bots spread through the ________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.

A

IRC

28
Q

A(n) ______ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services.

A

UPS

29
Q

__________ refers to a collection of disks that provide fault tolerance for shared data and applications.

A

RAID

30
Q

A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.

A

backup

31
Q

____ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users

A

disaster recovery

32
Q

A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.

A

surge

33
Q

A complete power loss.

A

blackout

34
Q

Refers to how consistently and reliably a file or system can be accessed by authorized personnel.

A

availability

35
Q

A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network’s current state.

A

hot site

36
Q

A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.

A

warm site

37
Q

A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.

A

cold site

38
Q

Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.

A

noise

39
Q

Refers to the soundness of a network’s programs, data, services, devices, and connections.

A

integrity

40
Q

A momentary decrease in voltage.

A

brownout

41
Q

A program that disguises itself as something useful but actually harms your system is called a _____.

A

Trojan horse

42
Q

A ____ virus disguises itself as a legitimate program to prevent detection.

A

Stealth

43
Q

A ____ virus changes its characteristics every time it is transferred to a new system.

A

Polymorphic

44
Q

A ____ is a deviation from a specified level of system performance for a given period of time.

A

Failure

45
Q

An ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

A

Online

46
Q

____ is a fault-tolerance technique that links multiple servers together to act as a single server.

A

Clustering

47
Q

____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability.

A

Mirrored

48
Q

A group of hard disks is called a ____.

A

Disk array

49
Q

____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for anetwork.

A

NAS

50
Q

____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

A

Optical media

51
Q

An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.

A

Bit

52
Q

Many bots spread through the ____, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.

A

IRC

53
Q

____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

A

NAS