Reports must be specific on both the message and which of the following?
Reports must be specific on both the message and which of the following?
This is an example of checking for the principle of…
When you approach a restricted facility, you are requested for identification and verified against a pre-approved list by the guard at the front gate before being let in. This is an example of checking for the principle of
The major benefit of information classification is to…
The major benefit of information classification is to
When information, once classified highly sensitive, is no longer critical or highly valued, that information m
When information, once classified highly sensitive, is no longer critical or highly valued, that information must be
Updating records in multiple locations or copying an entire database on to a remote location as a means to ens
Updating records in multiple locations or copying an entire database on to a remote location as a means to ensure the appropriate levels of fault-tolerance and redundancy is known as
Which of the following type of high-availability backup strategy is recommended?
When the backup window is not long enough to backup all of the data and the restoration of backup must be as fast as possible. Which of the following type of high-availability backup strategy is recommended?
If speed is preferred over resilience, which of the following RAID configuration is the most suited?
If speed is preferred over resilience, which of the following RAID configuration is the most suited?
The doors of a data center opens up in the event of a fire…
The doors of a data center opens up in the event of a fire. This is an example of
In order to ensure constant redundancy and fault-tolerance, which of the following type of spare is recommende
In order to ensure constant redundancy and fault-tolerance, which of the following type of spare is recommended?
Which of the following provides controlled and unintercepted interfaces into privileged user functions?
Which of the following provides controlled and unintercepted interfaces into privileged user functions?