Chapter 14 quiz Flashcards
T/F: Protection against harmful code involves more than just installing anti-malware software.
True
T/F: When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
True
T/F: An anti-malware policy is meant to protect the network from damage and downtime.
True
T/F: The goal of fault-tolerant systems is to prevent failures from progressing to faults.
False
T/F: Generators provide surge protection.
False
____ is intended to eliminate single points of failure.
redundancy
A program that disguises itself as something useful but actually harms your system is called a ____.
trojan horse
____ are programs that run independently and travel between computers and across networks.
worms
A ____ is a program that runs automatically, without requiring a person to start or stop it.
bot
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
stealth
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
polymorphic
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
signature
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
integrity checking
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
heuristic
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
failure
Power that is free from noise is called “____” power.
clean
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
online
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
SONET ring
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.
load balancing
Which RAID offers the best performance.
RAID level 0
Which RAID provides redundancy through a process called disk mirroring.
RAID level 1
In which RAID does parity error checking occur when data is written across the disk array.
RAID level 3
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network
NAS
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
SANs
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
optical media
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
bit
Many bots spread through the ________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
IRC
A(n) ______ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services.
UPS
__________ refers to a collection of disks that provide fault tolerance for shared data and applications.
RAID
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
backup
____ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users
disaster recovery
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
surge
A complete power loss.
blackout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
availability
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network’s current state.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
warm site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
cold site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
noise
Refers to the soundness of a network’s programs, data, services, devices, and connections.
integrity
A momentary decrease in voltage.
brownout
A program that disguises itself as something useful but actually harms your system is called a _____.
Trojan horse
A ____ virus disguises itself as a legitimate program to prevent detection.
Stealth
A ____ virus changes its characteristics every time it is transferred to a new system.
Polymorphic
A ____ is a deviation from a specified level of system performance for a given period of time.
Failure
An ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
Online
____ is a fault-tolerance technique that links multiple servers together to act as a single server.
Clustering
____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability.
Mirrored
A group of hard disks is called a ____.
Disk array
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for anetwork.
NAS
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
Optical media
An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.
Bit
Many bots spread through the ____, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
IRC
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
NAS