Front | Back |
A program disguises itself as something useful but actually harms your system is called _____.a. virusb. wormc. botd. Trojan horse
|
Trojan horse
|
A(n) ____ UPS uses the A/C power from wall outlet to continuously charge its battery, while providing power to a network device through its battery.a. standbyb. offlinec. offsited. online
|
Online
|
A(n) _____ virus disguises itself as a legitimate program to prevent detection.a. stealthb. encryptedc. time dependentd. polymorphic
|
Stealth
|
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the must be archived.a. bitb. bytec. wordd. field
|
Bit
|
Power that is free from noise is called "_____" power.a. clearb. cleanc. filteredd. white
|
Clean
|
_____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.a. Integrity checkingb. Polymorphicc. Signatured. Heuristic
|
Integrity checking
|
_____ is intended to eliminate single points of failure.a. Availabilityb. Redundancyc. Contingencyd. Integrity
|
Redundancy
|
_____ offers the best performance.a. RAID Level 0b. RAID Level 1c. RAID Level 3d. RAID Level 5
|
RAID Level 0
|
_____ provides redundancy through a process called disk mirroring.a. RAID Level 0b. RAID Level 1c. RAID Level 3d. RAID Level 5
|
RAID Level 1
|
_____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.a. Integrity checkingb. Polymorphicc. Signatured. Heuristic
|
Signature
|