EngradeWikisNetwork Fundmentals Study Guide › Chapter 14

Chapter 14

Chapter 14 Study Guide

Network Fundamentals Chapter 14

Multiple Choice
Identify the choice that best completes the statement or answers the question.

____ 1. ____ is intended to eliminate single points of failure.
a. Availability c. Contingency
b. Redundancy d. Integrity


____ 2. A program that disguises itself as something useful but actually harms your system is called a ____.
a. virus c. bot
b. worm d. Trojan horse


____ 3. ____ are programs that run independently and travel between computers and across networks.
a. Viruses c. Bots
b. Worms d. Trojan horses


____ 4. A ____ is a program that runs automatically, without requiring a person to start or stop it.
a. virus c. bot
b. worm d. Trojan horse


____ 5. A(n) ____ virus disguises itself as a legitimate program to prevent detection.
a. stealth c. time dependent
b. encrypted d. polymorphic


____ 6. A(n) ____ virus changes its characteristics every time it is transferred to a new system.
a. stealth c. time dependent
b. encrypted d. polymorphic


____ 7. ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
a. Integrity checking c. Signature
b. Polymorphic d. Heuristic


____ 8. ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
a. Integrity checking c. Signature
b. Polymorphic d. Heuristic


____ 9. ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
a. Integrity checking c. Signature
b. Polymorphic d. Heuristic


____ 10. A(n) ____ is a deviation from a specified level of system performance for a given period of time.
a. fault c. error
b. failure d. hoax


____ 11. Power that is free from noise is called “____” power.
a. clear c. filtered
b. clean d. white


____ 12. A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
a. standby c. offsite
b. offline d. online


____ 13. Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
a. star c. bus
b. SONET rings d. ring


____ 14. ____ is an automatic distribution of traffic over multiple links or processors to optimize response.
a. Redundancy c. RAID
b. Failover d. Load balancing


____ 15. ____ offers the best performance.
a. RAID Level 0 c. RAID Level 3
b. RAID Level 1 d. RAID Level 5


____ 16. ____ provides redundancy through a process called disk mirroring.
a. RAID Level 0 c. RAID Level 3
b. RAID Level 1 d. RAID Level 5


____ 17. In ____, parity error checking occurs when data is written across the disk array.
a. RAID Level 0 c. RAID Level 3
b. RAID Level 1 d. RAID Level 5


____ 18. ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
a. NAS c. SANs
b. RAID d. Optical media


____ 19. ____ are distinct networks of storage devices that communicate directly with each other and with other networks.
a. NAS c. SANs
b. RAID d. Optical media


____ 20. ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
a. Tape backup media c. Fiber optic media
b. Optical media d. USB


____ 21. An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
a. bit c. word
b. byte d. field


Matching

Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity


____ 22. A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.

____ 23. Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.

____ 24. Refers to how consistently and reliably a file or system can be accessed by authorized personnel.

____ 25. A momentary decrease in voltage.

____ 26. A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.

____ 27. Refers to the soundness of a network’s programs, data, services, devices, and connections.

____ 28. A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.

____ 29. A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network’s current state.

____ 30. A complete power loss.
    Close