NAME

Question types


Start with


Question limit

of 40 available terms

Print test

5 Written questions

5 Matching questions

  1. RAID level 0
  2. RAID level 1
  3. noise
  4. trojan horse
  5. True
  1. a Which RAID offers the best performance.
  2. b T/F: An anti-malware policy is meant to protect the network from damage and downtime.
  3. c Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
  4. d Which RAID provides redundancy through a process called disk mirroring.
  5. e A program that disguises itself as something useful but actually harms your system is called a ____.

5 Multiple choice questions

  1. A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.
  2. ____ is intended to eliminate single points of failure.
  3. A(n) ____ virus disguises itself as a legitimate program to prevent detection.
  4. ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
  5. A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.

5 True/False questions

  1. polymorphicA place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.

          

  2. wormsA(n) ______ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.

          

  3. SANs____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

          

  4. botAn archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.

          

  5. integrityA(n) ____ virus disguises itself as a legitimate program to prevent detection.