Question 1
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
Answer
a. Polymorphic
b. Heuristic
c. Integrity checking
d. Signature
0.5 points
Question 2
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
Answer
a. Tape backup media
b. Optical media
c. Fiber optic media
d. USB
0.5 points
Question 3
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
Answer
a. Integrity checking
b. Polymorphic
c. Signature
d. Heuristic
0.5 points
Question 4
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
Answer
a. ring
b. bus
c. SONET rings
d. star
0.5 points
Question 5
____ are programs that run independently and travel between computers and across networks.
Answer
a. Viruses
b. Trojan horses
c. Worms
d. Bots
0.5 points
Question 6
____ provides redundancy through a process called disk mirroring.
Answer
a. RAID Level 0
b. RAID Level 1
c. RAID Level 3
d. RAID Level 5
0.5 points
Question 7
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
Answer
a. encrypted
b. polymorphic
c. stealth
d. time dependent
0.5 points
Question 8
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
Answer
a. error
b. hoax
c. fault
d. failure
0.5 points
Question 9
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
Answer
a. RAID
b. Load balancing
c. Redundancy
d. Failover
0.5 points
Question 10
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
Answer
a. NAS
b. Optical media
c. RAID
d. SANs
0.5 points
Question 11
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
Answer
a. byte
b. bit
c. field
d. word
0.5 points
Question 12
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
Answer
a. Heuristic
b. Integrity checking
c. Polymorphic
d. Signature
0.5 points
Question 13
Power that is free from noise is called “____” power.
Answer
a. filtered
b. white
c. clear
d. clean
0.5 points
Question 14
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
Answer
a. standby
b. offline
c. online
d. offsite
0.5 points
Question 15
A ____ is a program that runs automatically, without requiring a person to start or stop it.
Answer
a. bot
b. worm
c. Trojan horse
d. virus
0.5 points
Question 16
____ offers the best performance.
Answer
a. RAID Level 0
b. RAID Level 1
c. RAID Level 3
d. RAID Level 5
0.5 points
Question 17
A program that disguises itself as something useful but actually harms your system is called a ____.
Answer
a. bot
b. worm
c. Trojan horse
d. virus
0.5 points
Question 18
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
Answer
a. polymorphic
b. encrypted
c. stealth
d. time dependent
0.5 points
Question 19
____ is intended to eliminate single points of failure.
Answer
a. Contingency
b. Availability
c. Integrity
d. Redundancy
0.5 points
Question 20
In ____, parity error checking occurs when data is written across the disk array.
Answer
a. RAID Level 0
b. RAID Level 1
c. RAID Level 3
d. RAID Level 5