A systems administrator backs up company data to the public cloud as part of a disaster recovery plan. Which of the following BEST describes this replication method?

A. Disk-to-disk
B. Server-to-client
C. Site-to-site
D. Peer-to-peer

Answer: C. Site-to-site

Computer Science & Information Technology

You might also like to view...

Syn flood is the result of some incomplete protocol exchange: the client initiates an exchange but does not complete it. Unfortunately, these situations can also occur normally. Describe a benign situation that could cause a protocol exchange to be incomplete

What will be an ideal response?

Computer Science & Information Technology

?An _____ style takes precedence over other styles defined in a style sheet.

A. ?embedded B. ?external C. ?inline D. ?internal

Computer Science & Information Technology