Exam 14: Ensuring Integrity and Availability
Exam 1: An Introduction to Networking42 Questions
Exam 2: Network Standards and the OSI Model42 Questions
Exam 3: Transmission Basics and Networking Media42 Questions
Exam 4: Introduction to TCP/IP Protocols42 Questions
Exam 5: Topologies and Ethernet Standards40 Questions
Exam 6: Network Hardware, Switching, and Routing42 Questions
Exam 7: Wide Area Networks42 Questions
Exam 8: Wireless Networking41 Questions
Exam 9: In-Depth TCP/IP Networking42 Questions
Exam 10: Virtual Networks and Remote Access42 Questions
Exam 11: Network Security42 Questions
Exam 12: Voice and Video Over IP42 Questions
Exam 13: Troubleshooting Network Problems42 Questions
Exam 14: Ensuring Integrity and Availability42 Questions
Exam 15: Network Management42 Questions
Select questions type
Describe a backup rotation scheme and explain the goal of a good scheme.
(Essay)
5.0/5
(37)
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
(Multiple Choice)
4.8/5
(37)
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
(Multiple Choice)
4.9/5
(43)
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
(Multiple Choice)
4.9/5
(42)
Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies.
(Essay)
4.8/5
(36)
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
(Multiple Choice)
4.8/5
(41)
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
(Multiple Choice)
4.9/5
(29)
A ____ is a program that runs automatically, without requiring a person to start or stop it.
(Multiple Choice)
4.8/5
(24)
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
(Multiple Choice)
4.9/5
(41)
Explain why it is important to keep backups, boot disks, and emergency repair disks current and available.
(Essay)
4.7/5
(28)
A program that disguises itself as something useful but actually harms your system is called a ____.
(Multiple Choice)
4.7/5
(40)
____ are programs that run independently and travel between computers and across networks.
(Multiple Choice)
4.7/5
(31)
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
(Multiple Choice)
4.8/5
(29)
____ is a fault-tolerance technique that links multiple servers together to act as a single server.
(Multiple Choice)
4.8/5
(39)
An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)