How is a backup strategy tested to verify that it is a viable tool for recovery after a disaster?

A. Create an encrypted backup.
B. Restore files from backup media.
C. Review the backup policy.
D. Perform a verification pass immediately after the backup completes.


Answer: B. Restore files from backup media.

Computer Science & Information Technology

You might also like to view...

The __________ operator returns the remainder after dividing one number by another.

Fill in the blank(s) with correct word

Computer Science & Information Technology

TCP is a connectionless protocol.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following file formats CANNOT be imported into a PowerPoint presentation?

A) .pdf B) .txt C) .rtf D) .docx

Computer Science & Information Technology

Which formatting option is used to shade the background of characters?

A) Font Color B) Highlight Color C) Font D) Bold

Computer Science & Information Technology