Which key metric should be used when updating the corporate disaster recovery plan to minimize downtime?

Which key metric should be used when updating the corporate disaster recovery plan to minimize downtime?A . RTOB . MTBSIC . RPOD . MTBFView AnswerAnswer: A

April 4, 2024 No Comments READ MORE +

What is a disadvantage of source-based deduplication?

What is a disadvantage of source-based deduplication?A . Requires more network bandwidth to send data across LAN or WAN during the backupB . CPU cycles may impact application performanceC . High network load since the client checks all segments on the deduplication server deviceD . Increases CPU utilization in the...

April 4, 2024 No Comments READ MORE +

What is the MTBF of the system?

The operating time of a system is 24 hours per day, Monday through Saturday. Failure of the system occurs as follows. Monday: No failure Tuesday: 5 A. M. to 7 A. M. Wednesday: No failure Thursday: 4 P.M. to 8 P.M. Friday: 8 A. M. to 11 A. M. Saturday:...

April 4, 2024 No Comments READ MORE +

What is true of hot-swappable hardware?

What is true of hot-swappable hardware?A . All components need to be rearranged after swapB . Reboot is required after a changeC . All fans need to be running to ensure proper coolingD . Replaceable with zero downtimeView AnswerAnswer: D

April 4, 2024 No Comments READ MORE +

What are the three pillars of data security and management?

What are the three pillars of data security and management?A . Security, Confidentiality, and IntegrityB . High availability, Integrity, and ComplianceC . Integrity, Governance, and ComplianceD . Confidentiality, Integrity, and AvailabilityView AnswerAnswer: D

April 3, 2024 No Comments READ MORE +

What are the key functions of data management?

What are the key functions of data management?A . detection and orchestration managementB . discovery and operations managementC . configuration and detection managementD . rollout and configuration managementView AnswerAnswer: B

April 3, 2024 No Comments READ MORE +

How many backup copies are required to restore the requested files?

A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Saturday and differential backups for the rest of the week at same time. A data loss happened on Friday at 11 AM. How many backup copies are required to restore the requested files?A...

April 3, 2024 No Comments READ MORE +

Which is a driver of cloud-based data protection?

Which is a driver of cloud-based data protection?A . Improved resiliencyB . Reduced OPEXC . Improved fault toleranceD . Reduced CAPEXView AnswerAnswer: D

April 3, 2024 No Comments READ MORE +

Which key feature of content addressed storage stores data irrelevant to the application that requests the data?

Which key feature of content addressed storage stores data irrelevant to the application that requests the data?A . Location independenceB . Content authenticityC . Content integrityD . Audit trailsView AnswerAnswer: A

April 3, 2024 No Comments READ MORE +

What are the three phases of data protection in a software-defined data center framework?

What are the three phases of data protection in a software-defined data center framework?A . define protection requirements, create protection policies, and enable protection policiesB . create protection policies, push protection policies, and monitor job completionC . discover protection architecture, define protection services, and orchestrate protection operationsD . create protection...

April 3, 2024 No Comments READ MORE +