1. Question 1
  2.  
  3. ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
  4. Answer
  5. a. Polymorphic
  6. b. Heuristic
  7. c. Integrity checking
  8. d. Signature
  9. 0.5 points
  10. Question 2
  11.  
  12. ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
  13. Answer
  14. a. Tape backup media
  15. b. Optical media
  16. c. Fiber optic media
  17. d. USB
  18. 0.5 points
  19. Question 3
  20.  
  21. ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
  22. Answer
  23. a. Integrity checking
  24. b. Polymorphic
  25. c. Signature
  26. d. Heuristic
  27. 0.5 points
  28. Question 4
  29.  
  30. Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
  31. Answer
  32. a. ring
  33. b. bus
  34. c. SONET rings
  35. d. star
  36. 0.5 points
  37. Question 5
  38.  
  39. ____ are programs that run independently and travel between computers and across networks.
  40. Answer
  41. a. Viruses
  42. b. Trojan horses
  43. c. Worms
  44. d. Bots
  45. 0.5 points
  46. Question 6
  47.  
  48. ____ provides redundancy through a process called disk mirroring.
  49. Answer
  50. a. RAID Level 0
  51. b. RAID Level 1
  52. c. RAID Level 3
  53. d. RAID Level 5
  54. 0.5 points
  55. Question 7
  56.  
  57. A(n) ____ virus disguises itself as a legitimate program to prevent detection.
  58. Answer
  59. a. encrypted
  60. b. polymorphic
  61. c. stealth
  62. d. time dependent
  63. 0.5 points
  64. Question 8
  65.  
  66. A(n) ____ is a deviation from a specified level of system performance for a given period of time.
  67. Answer
  68. a. error
  69. b. hoax
  70. c. fault
  71. d. failure
  72. 0.5 points
  73. Question 9
  74.  
  75. ____ is an automatic distribution of traffic over multiple links or processors to optimize response.
  76. Answer
  77. a. RAID
  78. b. Load balancing
  79. c. Redundancy
  80. d. Failover
  81. 0.5 points
  82. Question 10
  83.  
  84. ____ are distinct networks of storage devices that communicate directly with each other and with other networks.
  85. Answer
  86. a. NAS
  87. b. Optical media
  88. c. RAID
  89. d. SANs
  90. 0.5 points
  91. Question 11
  92.  
  93. An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
  94. Answer
  95. a. byte
  96. b. bit
  97. c. field
  98. d. word
  99. 0.5 points
  100. Question 12
  101.  
  102. ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
  103. Answer
  104. a. Heuristic
  105. b. Integrity checking
  106. c. Polymorphic
  107. d. Signature
  108. 0.5 points
  109. Question 13
  110.  
  111. Power that is free from noise is called “____” power.
  112. Answer
  113. a. filtered
  114. b. white
  115. c. clear
  116. d. clean
  117. 0.5 points
  118. Question 14
  119.  
  120. A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
  121. Answer
  122. a. standby
  123. b. offline
  124. c. online
  125. d. offsite
  126. 0.5 points
  127. Question 15
  128.  
  129. A ____ is a program that runs automatically, without requiring a person to start or stop it.
  130. Answer
  131. a. bot
  132. b. worm
  133. c. Trojan horse
  134. d. virus
  135. 0.5 points
  136. Question 16
  137.  
  138. ____ offers the best performance.
  139. Answer
  140. a. RAID Level 0
  141. b. RAID Level 1
  142. c. RAID Level 3
  143. d. RAID Level 5
  144. 0.5 points
  145. Question 17
  146.  
  147. A program that disguises itself as something useful but actually harms your system is called a ____.
  148. Answer
  149. a. bot
  150. b. worm
  151. c. Trojan horse
  152. d. virus
  153. 0.5 points
  154. Question 18
  155.  
  156. A(n) ____ virus changes its characteristics every time it is transferred to a new system.
  157. Answer
  158. a. polymorphic
  159. b. encrypted
  160. c. stealth
  161. d. time dependent
  162. 0.5 points
  163. Question 19
  164.  
  165. ____ is intended to eliminate single points of failure.
  166. Answer
  167. a. Contingency
  168. b. Availability
  169. c. Integrity
  170. d. Redundancy
  171. 0.5 points
  172. Question 20
  173.  
  174. In ____, parity error checking occurs when data is written across the disk array.
  175. Answer
  176. a. RAID Level 0
  177. b. RAID Level 1
  178. c. RAID Level 3
  179. d. RAID Level 5