NAME

Question types


Start with


Question limit

of 40 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. blackout
  2. heuristic
  3. True
  4. bot
  5. failure
  1. a T/F: When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
  2. b A(n) ____ is a deviation from a specified level of system performance for a given period of time.
  3. c A complete power loss.
  4. d A ____ is a program that runs automatically, without requiring a person to start or stop it.
  5. e ____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.

5 Multiple choice questions

  1. Which RAID offers the best performance.
  2. T/F: The goal of fault-tolerant systems is to prevent failures from progressing to faults.
  3. An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
  4. Many bots spread through the ________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
  5. A(n) ____ virus changes its characteristics every time it is transferred to a new system.

5 True/False questions

  1. load balancingMesh topologies and ____ topologies are good choices for highly available enterprise networks.

          

  2. integrityRefers to the soundness of a network's programs, data, services, devices, and connections.

          

  3. disaster recoveryRefers to the soundness of a network's programs, data, services, devices, and connections.

          

  4. SANs____ are distinct networks of storage devices that communicate directly with each other and with other networks.

          

  5. TrueMany bots spread through the ________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.

          

Create Set