Question 1 ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior. Answer a. Polymorphic b. Heuristic c. Integrity checking d. Signature 0.5 points Question 2 ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it. Answer a. Tape backup media b. Optical media c. Fiber optic media d. USB 0.5 points Question 3 ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes. Answer a. Integrity checking b. Polymorphic c. Signature d. Heuristic 0.5 points Question 4 Mesh topologies and ____ topologies are good choices for highly available enterprise networks. Answer a. ring b. bus c. SONET rings d. star 0.5 points Question 5 ____ are programs that run independently and travel between computers and across networks. Answer a. Viruses b. Trojan horses c. Worms d. Bots 0.5 points Question 6 ____ provides redundancy through a process called disk mirroring. Answer a. RAID Level 0 b. RAID Level 1 c. RAID Level 3 d. RAID Level 5 0.5 points Question 7 A(n) ____ virus disguises itself as a legitimate program to prevent detection. Answer a. encrypted b. polymorphic c. stealth d. time dependent 0.5 points Question 8 A(n) ____ is a deviation from a specified level of system performance for a given period of time. Answer a. error b. hoax c. fault d. failure 0.5 points Question 9 ____ is an automatic distribution of traffic over multiple links or processors to optimize response. Answer a. RAID b. Load balancing c. Redundancy d. Failover 0.5 points Question 10 ____ are distinct networks of storage devices that communicate directly with each other and with other networks. Answer a. NAS b. Optical media c. RAID d. SANs 0.5 points Question 11 An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. Answer a. byte b. bit c. field d. word 0.5 points Question 12 ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database. Answer a. Heuristic b. Integrity checking c. Polymorphic d. Signature 0.5 points Question 13 Power that is free from noise is called “____” power. Answer a. filtered b. white c. clear d. clean 0.5 points Question 14 A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. Answer a. standby b. offline c. online d. offsite 0.5 points Question 15 A ____ is a program that runs automatically, without requiring a person to start or stop it. Answer a. bot b. worm c. Trojan horse d. virus 0.5 points Question 16 ____ offers the best performance. Answer a. RAID Level 0 b. RAID Level 1 c. RAID Level 3 d. RAID Level 5 0.5 points Question 17 A program that disguises itself as something useful but actually harms your system is called a ____. Answer a. bot b. worm c. Trojan horse d. virus 0.5 points Question 18 A(n) ____ virus changes its characteristics every time it is transferred to a new system. Answer a. polymorphic b. encrypted c. stealth d. time dependent 0.5 points Question 19 ____ is intended to eliminate single points of failure. Answer a. Contingency b. Availability c. Integrity d. Redundancy 0.5 points Question 20 In ____, parity error checking occurs when data is written across the disk array. Answer a. RAID Level 0 b. RAID Level 1 c. RAID Level 3 d. RAID Level 5