Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?

A. Daily
B. Incremental
C. Normal
D. Differential


Answer: B. Incremental

Computer Science & Information Technology

You might also like to view...

A tweet forwarded to other Twitter users is a ________

A) list B) hashtag C) vine D) retweet

Computer Science & Information Technology

________ is a collection of formatting options that can be applied to a picture, to text, or even to an object

A) A theme B) A style C) A transition D) Animation

Computer Science & Information Technology

Click the Insert Tab to add a button to the Quick Access Toolbar

Indicate whether the statement is true or false

Computer Science & Information Technology

The general security rule for assigning permissions to resources is to use the least privileges principle.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology