Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Question 1
- ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
- Answer
- a. Polymorphic
- b. Heuristic
- c. Integrity checking
- d. Signature
- 0.5 points
- Question 2
- ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
- Answer
- a. Tape backup media
- b. Optical media
- c. Fiber optic media
- d. USB
- 0.5 points
- Question 3
- ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
- Answer
- a. Integrity checking
- b. Polymorphic
- c. Signature
- d. Heuristic
- 0.5 points
- Question 4
- Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
- Answer
- a. ring
- b. bus
- c. SONET rings
- d. star
- 0.5 points
- Question 5
- ____ are programs that run independently and travel between computers and across networks.
- Answer
- a. Viruses
- b. Trojan horses
- c. Worms
- d. Bots
- 0.5 points
- Question 6
- ____ provides redundancy through a process called disk mirroring.
- Answer
- a. RAID Level 0
- b. RAID Level 1
- c. RAID Level 3
- d. RAID Level 5
- 0.5 points
- Question 7
- A(n) ____ virus disguises itself as a legitimate program to prevent detection.
- Answer
- a. encrypted
- b. polymorphic
- c. stealth
- d. time dependent
- 0.5 points
- Question 8
- A(n) ____ is a deviation from a specified level of system performance for a given period of time.
- Answer
- a. error
- b. hoax
- c. fault
- d. failure
- 0.5 points
- Question 9
- ____ is an automatic distribution of traffic over multiple links or processors to optimize response.
- Answer
- a. RAID
- b. Load balancing
- c. Redundancy
- d. Failover
- 0.5 points
- Question 10
- ____ are distinct networks of storage devices that communicate directly with each other and with other networks.
- Answer
- a. NAS
- b. Optical media
- c. RAID
- d. SANs
- 0.5 points
- Question 11
- An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
- Answer
- a. byte
- b. bit
- c. field
- d. word
- 0.5 points
- Question 12
- ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
- Answer
- a. Heuristic
- b. Integrity checking
- c. Polymorphic
- d. Signature
- 0.5 points
- Question 13
- Power that is free from noise is called “____” power.
- Answer
- a. filtered
- b. white
- c. clear
- d. clean
- 0.5 points
- Question 14
- A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
- Answer
- a. standby
- b. offline
- c. online
- d. offsite
- 0.5 points
- Question 15
- A ____ is a program that runs automatically, without requiring a person to start or stop it.
- Answer
- a. bot
- b. worm
- c. Trojan horse
- d. virus
- 0.5 points
- Question 16
- ____ offers the best performance.
- Answer
- a. RAID Level 0
- b. RAID Level 1
- c. RAID Level 3
- d. RAID Level 5
- 0.5 points
- Question 17
- A program that disguises itself as something useful but actually harms your system is called a ____.
- Answer
- a. bot
- b. worm
- c. Trojan horse
- d. virus
- 0.5 points
- Question 18
- A(n) ____ virus changes its characteristics every time it is transferred to a new system.
- Answer
- a. polymorphic
- b. encrypted
- c. stealth
- d. time dependent
- 0.5 points
- Question 19
- ____ is intended to eliminate single points of failure.
- Answer
- a. Contingency
- b. Availability
- c. Integrity
- d. Redundancy
- 0.5 points
- Question 20
- In ____, parity error checking occurs when data is written across the disk array.
- Answer
- a. RAID Level 0
- b. RAID Level 1
- c. RAID Level 3
- d. RAID Level 5
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement