Which backup operations clear the archive bit after the file has been backed up?
Which backup operations clear the archive bit after the file has been backed up? (Select two) A. copy B. normal C. differential D. incremental
Which backup operations clear the archive bit after the file has been backed up? (Select two) A. copy B. normal C. differential D. incremental
What happens during a differential backup? (Select two) A. The archive bit is set to 1 B. The archive bit is left alone C. The archive bit is reset to 0. D. The transaction log is cleared. E. The transaction…
In the GFS backup tape rotation plan, which type of backup is the Grandfather? A. copy B. normal C. differential D. incremental
What is considered a best practice for a data center? A. leaving KVM stations unlocked for ease of administraton B. labeling both ends of cables for easy or identifications C. unplugging redundant power supplies to conserve power D. storing all…
What are recommended procedures to ensure backup media is securely stored? (Select two) A. Place the backup media in a fire-proof safe. B. Ensure the switch on backup tapes is set to lock. C. Store a copy of all backup…
Which statement is true about in-band network management? A. Network ports or swtiches are not used for domain management. B. SSH protocol is used to access and manage the devices. C. A seperate network is maintaned for each management domain.…
Which categories of questions should you ask the customer during needs analysis? (Select two) A. facility size B. company location C. future plans D. business requirements
Which network management protocols are typically supported by system monitoring agents? (Select two) A. Internet Message Access Protocol (IMAP) B. Server Message Block (SMB) C. Secure Sock Layer (SSL) D. Intelligent Platform Management Interface (IPMI) E. Web-based Enterprise Management (WBEM)
What is the easiest solution for a company to implement in order to defend data from being compromised if a physical hard disk is stolen? A. a strong password policy for data shares B. TPM (Trusted Platform Module) in conjunction…
Match each power problem with its description. Select and Place: