At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?

At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?A . Protection Application B. Management Domain C. Data Source D. Database ApplicationView AnswerAnswer: C

June 12, 2023 No Comments READ MORE +

Which security control detects and blocks unusual network behavior?

Which security control detects and blocks unusual network behavior?A . IDPA B. VPN C. IDPS D. ZoningView AnswerAnswer: C Explanation: Reference: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901146

June 11, 2023 No Comments READ MORE +

What is a characteristic of data archiving?

What is a characteristic of data archiving?A . Secondary copy of data B. Primary copy of data C. Short-term retention D. Used for operational recoveryView AnswerAnswer: A Explanation: Data archiving is the process of moving data that is no longer actively used to a separate storage device or system for...

June 11, 2023 No Comments READ MORE +

What is true of hot-swappable hardware?

What is true of hot-swappable hardware?A . All components need to be rearranged after swap B. Reboot is required after a change C. All fans need to be running to ensure proper cooling D. Replaceable with zero downtimeView AnswerAnswer: D Explanation: Reference: https://whatis.techtarget.com/definition/hot-swap

June 10, 2023 No Comments READ MORE +

A computer has an MTBF of 7000 hours and an MTTR of 18 hours? What is the availability of the data?

A computer has an MTBF of 7000 hours and an MTTR of 18 hours? What is the availability of the data?A . 90.7% B. 99.1% C. 99.7% D. 99.8%View AnswerAnswer: A Explanation: Reference: https://limblecmms.com/blog/mttr-mtbf-mttf-guide-to-failure-metrics/

June 10, 2023 No Comments READ MORE +

Which security control provides logical isolation of devices on Ethernet?

Which security control provides logical isolation of devices on Ethernet?A . VPN B. Firewall C. VSAN D. VLANView AnswerAnswer: D Explanation: A VLAN is a logical network that is created by partitioning a physical network into multiple virtual networks. Devices on one VLAN are isolated from devices on other VLANs,...

June 9, 2023 No Comments READ MORE +

How many backup copies are required to restore the requested files?

A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Saturday and differential backups for the rest of the week at same time. A data loss happened on Friday at 11 AM. How many backup copies are required to restore the requested files?A...

June 9, 2023 No Comments READ MORE +

How is a hash created on file Apr.Txt in an object-level deduplication?

Refer to the exhibit. How is a hash created on file Apr.Txt in an object-level deduplication?A . from content with variable-length B. from the metadata of the file C. from the content of the file D. from content with fixed-lengthView AnswerAnswer: B Explanation: Reference: https://www.delltechnologies.com/asset/he-il/products/storage/industry-market/h17072-data-reduction-with-dell-emc-powermax.pdf

June 9, 2023 No Comments READ MORE +

How does a synthetic full backup enable a full backup copy to be created?

How does a synthetic full backup enable a full backup copy to be created?A . offline without disrupting the I/O operation on the production volume B. offline with less I/O operation to create index pointers using fast copy C. online with throttled I/O operation on the production volume D. online...

June 8, 2023 No Comments READ MORE +

Which key metric should be used when updating the corporate disaster recovery plan to minimize data loss?

Which key metric should be used when updating the corporate disaster recovery plan to minimize data loss?A . MTTR B. MTBF C. RPO D. RTOView AnswerAnswer: C Explanation: Reference: https://www.cockroachlabs.com/blog/demand-zero-rpo/#:~:text=RPO%20(which%20stands%20for%20Recovery,to%20recover%20from%20a %20failure

June 8, 2023 No Comments READ MORE +