____ is intended to eliminate single points of failure.
A program that disguises itself as something useful but actually harms your system is called a ____.
____ are programs that run independently and travel between computers and across networks.
A ____ is a program that runs automatically, without requireing a person to start or stop it.
A ____ virus disguises itself as a legitimate program to prevent detection.
A ____ virus changes its characteristics every time it is transferred to a new system.
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
A ____ is a deviation from a specified level of system performance for a given period of time.
Power that is free from noise is called "____" power.
An ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
RAID level 0
____ offers the best preformance.
RAID level 1
____ provides redundancy through a process called disk mirroring.
RAID level 3
In ____, parity error checking occurs when data is written across the disk array.
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
an archive ____ is a file attribute that can be checked or unchecked to indicate whether a file must archived.
____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.
A ____ is a graphical representation of a networks devices and connections.
A ____ is a graphical representation of a network's wired infrastructure.
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
____ management refers to the detection and signaling of device, link, or component faults.
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
A network management agent is a ____ that collects information about a device's operation and provides it to thenetwork management application.
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
____ is the local storage of frequently needed files that would otherwise be obtained from an external source.
The most common type of caching is ____ caching.
A ____ is a network device devoted to storage and delivery of frequently requested files.
A key component in managing networks is identifying and tracking its hardware and software through ____ management.
A ____ is a correction, imporovement, or enhancement to a particular piece of a software application.
A ____ is a major change to a software package's existing code.
____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.
The most critical type of software upgrade you will perform is an upgrade to your ____.
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.
A networked ____ is perhaps the simplest device to add.
Above all, keep ____ in mind when you upgrade or install hardware on a network.
The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.
Because the backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.