Which of the following technologies would allow the removal of a single point of failure?

A. Dual-homing a server
B. Clustering a SQL server
C. Adding a second VLAN to a switch
D. Assigning a second IP address to a NIC


Ans: A. Dual-homing a server

Computer Science & Information Technology

You might also like to view...

____________________ involves digging through trash receptacles to find information that can be useful in an attack.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When headings have been added or changed in a report after the table of contents has been create, click __________ to ensure the latest changes have been included in the table of contents.

A. Change Table B. Modify Table C. Update Table D. Revise Table

Computer Science & Information Technology

_____ ensures that authorized users have timely and reliable access to necessary information.

A. Availability B. Integrity C. Confidentiality D. Concealability

Computer Science & Information Technology

You know your current IT personnel knows nothing about SAP, so you will need to train them or hire experienced people. This is an assessment of your ________ feasibility.

A. Behavioral B. Economic C. Operational D. Technical

Computer Science & Information Technology