At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?
At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?A . Protection Application B. Management Domain C. Data Source D. Database ApplicationView AnswerAnswer: C
Which security control detects and blocks unusual network behavior?
Which security control detects and blocks unusual network behavior?A . IDPA B. VPN C. IDPS D. ZoningView AnswerAnswer: C Explanation: Reference: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901146
What is a characteristic of data archiving?
What is a characteristic of data archiving?A . Secondary copy of data B. Primary copy of data C. Short-term retention D. Used for operational recoveryView AnswerAnswer: A Explanation: Data archiving is the process of moving data that is no longer actively used to a separate storage device or system for...
What is true of hot-swappable hardware?
What is true of hot-swappable hardware?A . All components need to be rearranged after swap B. Reboot is required after a change C. All fans need to be running to ensure proper cooling D. Replaceable with zero downtimeView AnswerAnswer: D Explanation: Reference: https://whatis.techtarget.com/definition/hot-swap
A computer has an MTBF of 7000 hours and an MTTR of 18 hours? What is the availability of the data?
A computer has an MTBF of 7000 hours and an MTTR of 18 hours? What is the availability of the data?A . 90.7% B. 99.1% C. 99.7% D. 99.8%View AnswerAnswer: A Explanation: Reference: https://limblecmms.com/blog/mttr-mtbf-mttf-guide-to-failure-metrics/
Which security control provides logical isolation of devices on Ethernet?
Which security control provides logical isolation of devices on Ethernet?A . VPN B. Firewall C. VSAN D. VLANView AnswerAnswer: D Explanation: A VLAN is a logical network that is created by partitioning a physical network into multiple virtual networks. Devices on one VLAN are isolated from devices on other VLANs,...
How many backup copies are required to restore the requested files?
A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Saturday and differential backups for the rest of the week at same time. A data loss happened on Friday at 11 AM. How many backup copies are required to restore the requested files?A...
How is a hash created on file Apr.Txt in an object-level deduplication?
Refer to the exhibit. How is a hash created on file Apr.Txt in an object-level deduplication?A . from content with variable-length B. from the metadata of the file C. from the content of the file D. from content with fixed-lengthView AnswerAnswer: B Explanation: Reference: https://www.delltechnologies.com/asset/he-il/products/storage/industry-market/h17072-data-reduction-with-dell-emc-powermax.pdf
How does a synthetic full backup enable a full backup copy to be created?
How does a synthetic full backup enable a full backup copy to be created?A . offline without disrupting the I/O operation on the production volume B. offline with less I/O operation to create index pointers using fast copy C. online with throttled I/O operation on the production volume D. online...
Which key metric should be used when updating the corporate disaster recovery plan to minimize data loss?
Which key metric should be used when updating the corporate disaster recovery plan to minimize data loss?A . MTTR B. MTBF C. RPO D. RTOView AnswerAnswer: C Explanation: Reference: https://www.cockroachlabs.com/blog/demand-zero-rpo/#:~:text=RPO%20(which%20stands%20for%20Recovery,to%20recover%20from%20a %20failure