Professional Documents
Culture Documents
1 out of 1 points
Question 2
1 out of 1 points
Adding invisible information to a file that can be used to identify its source is called
________.
Selected Answer: watermarking
Question 3
1 out of 1 points
Question 4
1 out of 1 points
Question 5
1 out of 1 points
Another name for RAID 5 is ________.
Selected Answer: distributed parity
Question 6
1 out of 1 points
Question 7
1 out of 1 points
Question 8
1 out of 1 points
Question 9
1 out of 1 points
Compared to local backup, centralized backup ________.
Selected Answer: Both A and B
Question 10
1 out of 1 points
Question 11
1 out of 1 points
Question 12
1 out of 1 points
Question 13
1 out of 1 points
Question 14
1 out of 1 points
Question 15
1 out of 1 points
Question 16
1 out of 1 points
Question 17
1 out of 1 points
Question 18
1 out of 1 points
Incremental and full backups must be restored in the order in which they were created.
Selected Answer: True
Question 19
1 out of 1 points
Incremental backups are usually discarded after the next full backup.
Selected Answer: True
Question 20
1 out of 1 points
Question 21
1 out of 1 points
Question 22
1 out of 1 points
Question 23
1 out of 1 points
Spreadsheets are rarely the subject of compliance regulations.
Selected Answer: False
Question 24
1 out of 1 points
The process of keeping a backup copy of each file being worked on by backing it up every
few minutes is called ________.
Selected Answer: shadowing
Question 25
1 out of 1 points
Training users what not to put into e-mail messages is the most effective method of avoiding
problems during the legal discovery process.
Selected Answer: True
Question 26
1 out of 1 points
Question 27
1 out of 1 points
Two computer systems each back up the other in real time in ________.
Selected Answer: CDP
Question 28
1 out of 1 points
Question 29
1 out of 1 points
Question 30
1 out of 1 points
Question 31
1 out of 1 points
1 out of 1 points
Question 33
1 out of 1 points
Question 34
1 out of 1 points
________ backups only back up data that has changed since the most recent full backup.
Selected Answer: Incremental
Question 35
1 out of 1 points
Question 36
1 out of 1 points
________ is the process of obscuring data such that it cannot identify a specific person, but
remains practically useful.
Selected Answer: Data masking