A program that disguises itself as something useful but actually harms your system is called a ____.
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
A ____ is a deviation from a specified level of system performance for a given period of time.
An ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
an archive ____ is a file attribute that can be checked or unchecked to indicate whether a file must archived.
____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
A network management agent is a ____ that collects information about a device's operation and provides it to thenetwork management application.
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
____ is the local storage of frequently needed files that would otherwise be obtained from an external source.
A ____ is a network device devoted to storage and delivery of frequently requested files.
A key component in managing networks is identifying and tracking its hardware and software through ____ management.
A ____ is a correction, imporovement, or enhancement to a particular piece of a software application.
____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.