Exam 14: Ensuring Integrity and Availability
Exam 1: An Introduction to Networking42 Questions
Exam 2: Network Standards and the OSI Model42 Questions
Exam 3: Transmission Basics and Networking Media42 Questions
Exam 4: Introduction to TCP/IP Protocols42 Questions
Exam 5: Topologies and Ethernet Standards40 Questions
Exam 6: Network Hardware, Switching, and Routing42 Questions
Exam 7: Wide Area Networks42 Questions
Exam 8: Wireless Networking41 Questions
Exam 9: In-Depth TCP/IP Networking42 Questions
Exam 10: Virtual Networks and Remote Access42 Questions
Exam 11: Network Security42 Questions
Exam 12: Voice and Video Over IP42 Questions
Exam 13: Troubleshooting Network Problems42 Questions
Exam 14: Ensuring Integrity and Availability42 Questions
Exam 15: Network Management42 Questions
Select questions type
Define and describe a virus.
Free
(Essay)
4.8/5
(35)
Correct Answer:
Strictly speaking, a virus is a program that replicates itself with the intent to infect more computers, either through network connections or through the exchange of external storage devices. Viruses are typically copied to a computer's storage device without the user's knowledge. A virus might damage files or systems, or it might simply annoy users by flashing messages or pictures on the screen, for example. In fact, some viruses cause no harm and can remain unnoticed on a system indefinitely.
Protection against harmful code involves more than just installing anti-malware software.
Free
(True/False)
4.8/5
(33)
Correct Answer:
True
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.8/5
(33)
Correct Answer:
Explain the concept of a backup strategy and provide a list of eight questions the strategy should address.
(Essay)
4.8/5
(32)
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
(Multiple Choice)
4.8/5
(43)
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
(Short Answer)
4.8/5
(43)
When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
(True/False)
4.8/5
(33)
A(n) ____________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
(Short Answer)
4.9/5
(26)
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
(Multiple Choice)
4.7/5
(33)
____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability.
(Multiple Choice)
5.0/5
(31)
____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
(Short Answer)
4.8/5
(36)
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
(Multiple Choice)
4.9/5
(35)
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
(Short Answer)
4.7/5
(37)
An anti-malware policy is meant to protect the network from damage and downtime.
(True/False)
4.8/5
(32)
Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
(Short Answer)
5.0/5
(36)
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
(Multiple Choice)
4.9/5
(35)
____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.
(Multiple Choice)
4.8/5
(32)
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
(True/False)
4.8/5
(29)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)