Level 46 Level 48
Level 47

676 - 690


15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Worms
____ are programs that run independently and travel between computers and across networks.
bot
A ____ is a program that runs automatically, without requiring a person to start or stop it.
Stealth
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
POLYmorpic
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
Signature
____ scanning detects malware by comparing a file's content with known malware signatures in a
Integrity checking
____ detects malware by comparing current characteristics of files and disks against an
Heuristic
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
Failure
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
Clean
Power that is free from noise is called "____" power.
online
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing
SONET ring
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
Load balancing
____ is an automatic distribution of traffic over multiple links or processors is used to optimize
Clustering
____ is a fault-tolerance technique that links multiple servers together to act as a single
Mirrored
____ Web sites are locations on the Internet that dynamically duplicate other locations on the
disk array
A group of hard disks is called a ____.