How is a backup strategy tested to verify that it is a viable tool for recovery after a disaster?
A. Create an encrypted backup.
B. Restore files from backup media.
C. Review the backup policy.
D. Perform a verification pass immediately after the backup completes.
Answer: B. Restore files from backup media.
Computer Science & Information Technology
You might also like to view...
The __________ operator returns the remainder after dividing one number by another.
Fill in the blank(s) with correct word
Computer Science & Information Technology
TCP is a connectionless protocol.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following file formats CANNOT be imported into a PowerPoint presentation?
A) .pdf B) .txt C) .rtf D) .docx
Computer Science & Information Technology
Which formatting option is used to shade the background of characters?
A) Font Color B) Highlight Color C) Font D) Bold
Computer Science & Information Technology