Strata 10 Review Part 2

Is this your test? Login to manage it. If not, you can create a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A momentary increase in voltage due to lightning strikes, solar flares or electrical problems
2.
1 point
A firewall that can view a data stream
3.
1 point
A momentary decrease in voltage
4.
1 point
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic
5.
1 point
An archive____is a file attribute that can be checked or to indicate whether the file must be archived
6.
1 point
A(n)______is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
7.
1 point
Data is encrypted with two keys
8.
1 point
A firewall that protects only the computer on which it is installed
9.
1 point
A place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state
10.
1 point
______refers to a collection of disks that prove fault tolerance for shared data and applications
11.
1 point
Fluctuation in voltage levels caused by other devices on the network or electromagnetic
12.
1 point
____________is a process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users
13.
1 point
________is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm
14.
1 point
Refers to how consistently and reliably a file or system can be accessed by authorized personnel
15.
1 point
In general, information is ________if it could be used by other parties to impair an organizations functioning, decrease customer's confidence, cause of financial loss, damage an organization's status, or give a signification advantage to a competitor.
16.
1 point
Data is encrypted with a single key
17.
1 point
A(n)________is a thorough examination of each aspect of the network to determine how it might be compromised
18.
1 point
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
19.
1 point
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected
20.
1 point
The host that runs the proxy service
21.
1 point
Software that can only detect and log suspicious activity
22.
1 point
A complete power loss
23.
1 point
Refers to the soundness of a network's programs, data, services, devices, and connections
24.
1 point
Many bots spreads through the_____, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the internet
25.
1 point
____is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it
26.
1 point
A(n)________is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic
27.
1 point
A firewall that can block designated types of traffic based on application data contained within packets
28.
1 point
Software that can react to suspicious activity
29.
1 point
A(n)______is a copy of data or program files created for archiving or safekeeping
30.
1 point
A(n)________identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee