Exam 14: Ensuring Integrity and Availability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe a backup rotation scheme and explain the goal of a good scheme.

(Essay)
5.0/5
(37)

A(n) ____ virus changes its characteristics every time it is transferred to a new system.

(Multiple Choice)
4.8/5
(37)

A(n) ____ virus disguises itself as a legitimate program to prevent detection.

(Multiple Choice)
4.9/5
(43)

____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

(Multiple Choice)
4.9/5
(42)

____ is intended to eliminate single points of failure.

(Multiple Choice)
4.7/5
(33)

Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies.

(Essay)
4.8/5
(36)

A(n) ____ is a deviation from a specified level of system performance for a given period of time.

(Multiple Choice)
4.8/5
(41)

Describe how an organization implements anti-malware software.

(Essay)
4.8/5
(40)

Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

(Multiple Choice)
4.9/5
(29)

A ____ is a program that runs automatically, without requiring a person to start or stop it.

(Multiple Choice)
4.8/5
(24)

A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

(Multiple Choice)
4.9/5
(41)

Explain why it is important to keep backups, boot disks, and emergency repair disks current and available.

(Essay)
4.7/5
(28)

What is integrity checking?

(Essay)
4.9/5
(39)

A program that disguises itself as something useful but actually harms your system is called a ____.

(Multiple Choice)
4.7/5
(40)

____ are programs that run independently and travel between computers and across networks.

(Multiple Choice)
4.7/5
(31)

____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.

(Multiple Choice)
4.8/5
(29)

____ is a fault-tolerance technique that links multiple servers together to act as a single server.

(Multiple Choice)
4.8/5
(39)

A group of hard disks is called a ____.

(Multiple Choice)
4.9/5
(26)

Power that is free from noise is called "____" power.

(Multiple Choice)
4.9/5
(35)

An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)