Which of the following disaster recovery techniques may be least optimal in the case of a disaster?

A. empty shell
B. mutual aid pact
C. recovery operation center
D. they are all equally beneficial


Answer: B

Computer Science & Information Technology

You might also like to view...

Which character in the /etc/shadow file's encrypted password field means no password has been set for this user?

A. * B. % C. # D. !

Computer Science & Information Technology

Today, many attack tools are freely available and do not require any technical knowledge to use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is NOT a characteristic of small caps?

A) In small caps, capital letters are taller than noncapitalized ones. B) Small caps is a font style. C) Small caps is a font effect. D) In small caps, lowercase letters are eliminated; all are uppercase.

Computer Science & Information Technology

By choosing the Definition Only option in the Import Objects dialog box, the ____ of a table is imported, but not the ____.

A. data, structure B. data type, structure C. structure, data D. structure, data type

Computer Science & Information Technology