Exam 14: Ensuring Integrity and Availability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain why it is important to keep backups,boot disks,and emergency repair disks current and available.

(Essay)
4.9/5
(28)

____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.

(Short Answer)
4.7/5
(36)

____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

(Multiple Choice)
4.8/5
(38)

____ is an automatic distribution of traffic over multiple links or processors to optimize response.

(Multiple Choice)
4.7/5
(29)

The goal of fault-tolerant systems is to prevent failures from progressing to faults.

(True/False)
4.8/5
(32)

____ are distinct networks of storage devices that communicate directly with each other and with other networks.

(Multiple Choice)
4.8/5
(36)

An anti-malware policy is meant to protect the network from damage and downtime.

(True/False)
4.8/5
(35)

A(n)____________________ is a copy of data or program files created for archiving or safekeeping.

(Short Answer)
4.9/5
(38)

____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

(Multiple Choice)
4.8/5
(33)

Describe how an organization implements anti-malware software.

(Essay)
4.8/5
(35)

____ are programs that run independently and travel between computers and across networks.

(Multiple Choice)
4.9/5
(43)

____ offers the best performance.

(Multiple Choice)
5.0/5
(38)

A program that disguises itself as something useful but actually harms your system is called a ____.

(Multiple Choice)
4.8/5
(30)

____ provides redundancy through a process called disk mirroring.

(Multiple Choice)
4.7/5
(41)

Define disk duplexing and describe how it is related to disk mirroring.

(Essay)
4.9/5
(36)

Protection against harmful code involves more than just installing anti-malware software.

(True/False)
4.9/5
(27)

MATCHING Match each item with a statement below: a.surge f.availability b.noise g.cold site c.brownout h.warm site d.blackout i.hot site e.integrity -A place where the computers,devices,and connectivity necessary to rebuild a network exist,with some appropriately configured,updated,or connected.

(Short Answer)
4.8/5
(34)

Generators provide surge protection.

(True/False)
4.9/5
(39)

____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.

(Multiple Choice)
4.8/5
(36)

Describe the key to fault tolerance in network design.Provide examples of fault tolerant topologies.

(Essay)
4.7/5
(38)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)