Question 31
Lily works as a disaster recovery professional in an IT company. The archiving method used by the company provides the tools and software required for the archiving of data. The data can be easily accessed and cataloged in this method. However, this method involves recurring costs in its cooling and maintenance. What data archiving method is being used by Lily's company?
Question 32
Which of the following techniques verifies that data is safe, secure, and readable after going through processes like update, restore, or retrieve?
Question 33
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Question 34
An organization is facing issues with updating its data since it has been the culture of the organization for employees to create individual backups for the same data. This is not only consuming a lot of virtual storage space but is also eating into the bandwidth of the organization. Additionally, this can also lead to a potential data leak in the organization. What can be done to contain this situation?
Question 35
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?
