Which of the following technologies would allow the removal of a single point of failure?
A. Dual-homing a server
B. Clustering a SQL server
C. Adding a second VLAN to a switch
D. Assigning a second IP address to a NIC
Ans: A. Dual-homing a server
You might also like to view...
____________________ involves digging through trash receptacles to find information that can be useful in an attack.
Fill in the blank(s) with the appropriate word(s).
When headings have been added or changed in a report after the table of contents has been create, click __________ to ensure the latest changes have been included in the table of contents.
A. Change Table B. Modify Table C. Update Table D. Revise Table
_____ ensures that authorized users have timely and reliable access to necessary information.
A. Availability B. Integrity C. Confidentiality D. Concealability
You know your current IT personnel knows nothing about SAP, so you will need to train them or hire experienced people. This is an assessment of your ________ feasibility.
A. Behavioral B. Economic C. Operational D. Technical