Chapter 14/15

42 terms by lluton 

Ready to study?
Start with Flashcards

Create a new folder

Advertisement Upgrade to remove ads

redundancy

____ is intended to eliminate single points of failure.

trojan horse

A program that disguises itself as something useful but actually harms your system is called a ____.

worms

____ are programs that run independently and travel between computers and across networks.

bot

A ____ is a program that runs automatically, without requireing a person to start or stop it.

stealth

A ____ virus disguises itself as a legitimate program to prevent detection.

polymorphic

A ____ virus changes its characteristics every time it is transferred to a new system.

signature

____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.

integrity checking

____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

heuristic

____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.

failure

A ____ is a deviation from a specified level of system performance for a given period of time.

clean

Power that is free from noise is called "____" power.

online

An ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

SONET rings

Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

load balancing

____ is an automatic distribution of traffic over multiple links or processors to optimize response.

RAID level 0

____ offers the best preformance.

RAID level 1

____ provides redundancy through a process called disk mirroring.

RAID level 3

In ____, parity error checking occurs when data is written across the disk array.

NAS

____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

SANs

____ are distinct networks of storage devices that communicate directly with each other and with other networks.

optical media

____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

bit

an archive ____ is a file attribute that can be checked or unchecked to indicate whether a file must archived.

configuration

____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.

network diagram

A ____ is a graphical representation of a networks devices and connections.

wiring schematic

A ____ is a graphical representation of a network's wired infrastructure.

performance

____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.

fault

____ management refers to the detection and signaling of device, link, or component faults.

polling

The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.

software routine

A network management agent is a ____ that collects information about a device's operation and provides it to thenetwork management application.

traffic shaping

____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.

caching

____ is the local storage of frequently needed files that would otherwise be obtained from an external source.

web

The most common type of caching is ____ caching.

cache engine

A ____ is a network device devoted to storage and delivery of frequently requested files.

asset

A key component in managing networks is identifying and tracking its hardware and software through ____ management.

patch

A ____ is a correction, imporovement, or enhancement to a particular piece of a software application.

software upgrade

A ____ is a major change to a software package's existing code.

application

____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.

NOS

The most critical type of software upgrade you will perform is an upgrade to your ____.

backleveling

The process of reverting to a previous version of software after attempting to upgrade it is known as ____.

workstation

A networked ____ is perhaps the simplest device to add.

safety

Above all, keep ____ in mind when you upgrade or install hardware on a network.

backbone

The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.

justify

Because the backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set