________ uses various replication technologies to copy selected virtual machines to a secondary site in the case of a data center disaster.
A) Site Recovery Manager
B) DPM
C) Fault Tolerance
D) Storage VMotion
A) Site Recovery Manager
You might also like to view...
Which windowsproperty identifies the name by which the windowis known in a program?
a. name b. title c. label d. A window does not need to be identified in a program.
The first row of State is not altered; for the second row a 1-byte circular left shift is performed; for the third row a 2-byte circular left shift is performed; and for the fourth row a 3-byte circular left shift is performed. This transformation is called __________ .
A. AddRoundKey B. ShiftRows C. MixColumns D. Substitute bytes
Setting the list-style-type to ____ causes the bullets in front of each list item to not be displayed.
A. zero B. none C. 0 D. hide
Which of the following is true about the benefits of networking?
A. People share information through special group projects, databases, blogs, social media, and more. B. One hardware device connected to a network can serve the needs of many users. C. Software sharing saves money. D. All of the above are true.