Final Review - Chapter 14

Chapter 14 quiz

10 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
A program disguises itself as something useful but actually harms your system is called _____.a. virusb. wormc. botd. Trojan horse
Trojan horse
A(n) ____ UPS uses the A/C power from wall outlet to continuously charge its battery, while providing power to a network device through its battery.a. standbyb. offlinec. offsited. online
Online
A(n) _____ virus disguises itself as a legitimate program to prevent detection.a. stealthb. encryptedc. time dependentd. polymorphic
Stealth
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the must be archived.a. bitb. bytec. wordd. field
Bit
Power that is free from noise is called "_____" power.a. clearb. cleanc. filteredd. white
Clean
_____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.a. Integrity checkingb. Polymorphicc. Signatured. Heuristic
Integrity checking
_____ is intended to eliminate single points of failure.a. Availabilityb. Redundancyc. Contingencyd. Integrity
Redundancy
_____ offers the best performance.a. RAID Level 0b. RAID Level 1c. RAID Level 3d. RAID Level 5
RAID Level 0
_____ provides redundancy through a process called disk mirroring.a. RAID Level 0b. RAID Level 1c. RAID Level 3d. RAID Level 5
RAID Level 1
_____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.a. Integrity checkingb. Polymorphicc. Signatured. Heuristic
Signature