Exam 14: Ensuring Integrity and Availability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Define and describe a virus.

Free
(Essay)
4.8/5
(35)
Correct Answer:
Verified

Strictly speaking, a virus is a program that replicates itself with the intent to infect more computers, either through network connections or through the exchange of external storage devices. Viruses are typically copied to a computer's storage device without the user's knowledge. A virus might damage files or systems, or it might simply annoy users by flashing messages or pictures on the screen, for example. In fact, some viruses cause no harm and can remain unnoticed on a system indefinitely.

Protection against harmful code involves more than just installing anti-malware software.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

True

Match each item with a statement below:
A complete power loss.
cold site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
brownout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
integrity
Correct Answer:
Verified
Premises:
Responses:
A complete power loss.
cold site
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
brownout
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
integrity
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
warm site
Refers to the soundness of a network's programs, data, services, devices, and connections.
hot site
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
noise
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
surge
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
Availability
A momentary decrease in voltage.
blackout
Free
(Matching)
4.8/5
(33)
Correct Answer:
Verified

Explain the concept of a backup strategy and provide a list of eight questions the strategy should address.

(Essay)
4.8/5
(32)

____ are distinct networks of storage devices that communicate directly with each other and with other networks.

(Multiple Choice)
4.8/5
(43)

____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.

(Short Answer)
4.8/5
(43)

What are external disk drives and why are they useful?

(Essay)
5.0/5
(29)

When implementing anti-malware software on a network, one of your most important decisions is where to install the software.

(True/False)
4.8/5
(33)

A(n) ____________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.

(Short Answer)
4.9/5
(26)

____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

(Multiple Choice)
4.7/5
(33)

____ Web sites are locations on the Internet that dynamically duplicate other locations on the Internet, to ensure their continual availability.

(Multiple Choice)
5.0/5
(31)

____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.

(Short Answer)
4.8/5
(36)

____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

(Multiple Choice)
4.9/5
(35)

Generators provide surge protection.

(True/False)
4.8/5
(33)

A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.

(Short Answer)
4.7/5
(37)

An anti-malware policy is meant to protect the network from damage and downtime.

(True/False)
4.8/5
(32)

Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.

(Short Answer)
5.0/5
(36)

____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.

(Multiple Choice)
4.9/5
(35)

____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.

(Multiple Choice)
4.8/5
(32)

The goal of fault-tolerant systems is to prevent failures from progressing to faults.

(True/False)
4.8/5
(29)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)