Term
|
Definition
A(n) ____ virus changes its characteristics every time it is transferred to a new system. |
|
|
Term
|
Definition
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior |
|
|
Term
|
Definition
____ are programs that run independently and travel between computers and across networks |
|
|
Term
|
Definition
In ____Level 3, parity error checking occurs when data is written across the disk array |
|
|
Term
|
Definition
A(n) ____ is a deviation from a specified level of system performance for a given period of time |
|
|
Term
|
Definition
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. |
|
|
Term
|
Definition
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database. |
|
|
Term
|
Definition
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. |
|
|
Term
|
Definition
A(n) ____ virus disguises itself as a legitimate program to prevent detection |
|
|
Term
|
Definition
A program that disguises itself as something useful but actually harms your system is called a ____ horse. |
|
|
Term
|
Definition
____ checking detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes |
|
|
Term
|
Definition
Load ____ is an automatic distribution of traffic over multiple links or processors to optimize response |
|
|
Term
|
Definition
____ are distinct networks of storage devices that communicate directly with each other and with other networks. |
|
|
Term
|
Definition
____ media is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it. |
|
|
Term
|
Definition
Power that is free from noise is called “____” power. |
|
|
Term
|
Definition
____ is intended to eliminate single points of failure |
|
|
Term
|
Definition
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network. |
|
|
Term
|
Definition
Mesh topologies and ____ ring topologies are good choices for highly available enterprise networks |
|
|
Term
|
Definition
RAID Level 1provides redundancy through a process called disk _______. |
|
|
Term
|
Definition
A ____ is a program that runs automatically, without requiring a person to start or stop it |
|
|