What type of alternate processing facility generally contains all of the hardware, software, and data necessary to assume primary data processing responsibility for the organization in the event of a disaster?
a. Hot site
b. Mobile site
c. Warm site
d. Cold site
Answer: a. Hot site
You might also like to view...
_________ is a protocol to allow X.509 certificates, commonly used for Transport Layer Security (TLS), to be bound to DNS names using DNSSEC.
Fill in the blank(s) with the appropriate word(s).
How could email be sent to a list of 100 recipients using PGP or a similar scheme? Suggest a scheme that is simpler and faster when the list is used frequently.
What will be an ideal response?
When the ping command is used to communicate with an Internet computer using the computer's hostname, what happens first?
A. a query is made to resolve the hostname B. an ICMP Echo Request message is sent C. an ARP reply is sent D. an ICMP Echo Reply message is sent
What are some of the PSK key management weaknesses?
What will be an ideal response?