Exam 14: Ensuring Integrity and Availability
Exam 1: An Introduction to Networking50 Questions
Exam 2: Network Standards and the OSI Model50 Questions
Exam 3: Transmission Basics and Networking Media50 Questions
Exam 4: Introduction to TCP/IP Protocols50 Questions
Exam 5: Topologies and Ethernet Standards48 Questions
Exam 6: Network Hardware50 Questions
Exam 7: WANs and Remote Connectivity50 Questions
Exam 8: Wireless Networking50 Questions
Exam 9: Network Operating Systems50 Questions
Exam 10: In-Depth TCP/IP Networking50 Questions
Exam 11: Voice and Video Over IP50 Questions
Exam 12: Network Security50 Questions
Exam 13: Troubleshooting Network Problems50 Questions
Exam 14: Ensuring Integrity and Availability50 Questions
Exam 15: Network Management50 Questions
Select questions type
Explain why it is important to keep backups,boot disks,and emergency repair disks current and available.
(Essay)
4.9/5
(28)
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
(Short Answer)
4.7/5
(36)
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
(Multiple Choice)
4.8/5
(38)
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
(Multiple Choice)
4.7/5
(29)
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
(True/False)
4.8/5
(32)
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
(Multiple Choice)
4.8/5
(36)
An anti-malware policy is meant to protect the network from damage and downtime.
(True/False)
4.8/5
(35)
A(n)____________________ is a copy of data or program files created for archiving or safekeeping.
(Short Answer)
4.9/5
(38)
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
(Multiple Choice)
4.8/5
(33)
____ are programs that run independently and travel between computers and across networks.
(Multiple Choice)
4.9/5
(43)
A program that disguises itself as something useful but actually harms your system is called a ____.
(Multiple Choice)
4.8/5
(30)
____ provides redundancy through a process called disk mirroring.
(Multiple Choice)
4.7/5
(41)
Define disk duplexing and describe how it is related to disk mirroring.
(Essay)
4.9/5
(36)
Protection against harmful code involves more than just installing anti-malware software.
(True/False)
4.9/5
(27)
MATCHING
Match each item with a statement below:
a.surge
f.availability
b.noise
g.cold site
c.brownout
h.warm site
d.blackout
i.hot site
e.integrity
-A place where the computers,devices,and connectivity necessary to rebuild a network exist,with some appropriately configured,updated,or connected.
(Short Answer)
4.8/5
(34)
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
(Multiple Choice)
4.8/5
(36)
Describe the key to fault tolerance in network design.Provide examples of fault tolerant topologies.
(Essay)
4.7/5
(38)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)