T/F: Protection against harmful code involves more than just installing anti-malware software.
T/F: When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
T/F: An anti-malware policy is meant to protect the network from damage and downtime.
T/F: The goal of fault-tolerant systems is to prevent failures from progressing to faults.
T/F: Generators provide surge protection.
____ is intended to eliminate single points of failure.
A program that disguises itself as something useful but actually harms your system is called a ____.
____ are programs that run independently and travel between computers and across networks.
A ____ is a program that runs automatically, without requiring a person to start or stop it.
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
Power that is free from noise is called "____" power.
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
RAID level 0
Which RAID offers the best performance.
RAID level 1
Which RAID provides redundancy through a process called disk mirroring.
RAID level 3
In which RAID does parity error checking occur when data is written across the disk array.
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
Many bots spread through the ________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
A(n) ______ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
__________ refers to a collection of disks that provide fault tolerance for shared data and applications.
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
____ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
A complete power loss.
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
Refers to the soundness of a network's programs, data, services, devices, and connections.
A momentary decrease in voltage.