which of the following?
Jane has implemented an array of four servers to accomplish one specific task. This is BEST known as
which of the following?
Which of the following technologies uses multiple devices to share work?
Which of the following technologies uses multiple devices to share work?
Which of the following provides the BEST application availability and is easily expanded as demand grows?
Which of the following provides the BEST application availability and is easily expanded as demand
grows?
Which of the following can be utilized in order to provide temporary IT support…?
Which of the following can be utilized in order to provide temporary IT support during a disaster, where
the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to
restore those services?
which of the following concepts?
A security administrator has just finished creating a hot site for the company. This implementation relates
to which of the following concepts?
Which of the following disaster recovery strategies has the highest cost and shortest recovery time?
Which of the following disaster recovery strategies has the highest cost and shortest recovery time?
Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenar
A company wants to ensure that its hot site is prepared and functioning. Which of the following would be
the BEST process to verify the backup datacenter is prepared for such a scenario?
Which of the following can be implemented?
The Chief Information Officer (CIO) wants to implement a redundant server location to which the
production server images can be moved within 48 hours and services can be quickly restored, in case of a
catastrophic failure of the primary datacenter’s HVAC. Which of the following can be implemented?
Which of the following is the BEST concept to maintain required but non-critical server availability?
Which of the following is the BEST concept to maintain required but non-critical server availability?
Which of the following can a security technician implement to ensure that documents…?
After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the
document is no longer encrypted. Which of the following can a security technician implement to ensure
that documents stored on Joe’s desktop remain encrypted when moved to external media or other
network based storage?