When you use the /M switch with the XCOPY command, the system will perform what type of backup?
A. differential
B. incremental
C. full
D. reverse
Answer: B
You might also like to view...
What is the most common characteristic of a capability model?
Fill in the blank(s) with the appropriate word(s).
Which of the following could be used as hard drive controllers? (Choose all that apply.)
ATA PATA SATA SCSI
What are the seven steps involved in printing from a laser printer?
What will be an ideal response?
Answer the following statements true (T) or false (F)
1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.