What specific way can disaster recovery plans be tested?
A. alternative processing
B. restoration simulation
C. tabletop exercises
D. alternative exercises
Answer: C
You might also like to view...
Examples of something the individual possesses would include cryptographic keys, electronic keycards, smart cards, and physical keys. This type of authenticator is referred to as a __________ .
Fill in the blank(s) with the appropriate word(s).
Match each of the following extensions to its file type:
I. .jpg II. .mp3 III. .docx IV. .xlsx V. .mov A. audio file B. Excel workbook C. Word document D. image file E. video file
Where would you go to set up validation fields?
A) A table's Field Rules pane B) A table's Field Properties pane C) A table's Data Entry Rules pane D) A table's Text Properties pane
A(n) ________ lists words that have the same or similar meaning to the word being looked up
A) atlas B) thesaurus C) almanac D) dictionary