A systems administrator backs up company data to the public cloud as part of a disaster recovery plan. Which of the following BEST describes this replication method?
A. Disk-to-disk
B. Server-to-client
C. Site-to-site
D. Peer-to-peer
Answer: C. Site-to-site
Computer Science & Information Technology
You might also like to view...
Syn flood is the result of some incomplete protocol exchange: the client initiates an exchange but does not complete it. Unfortunately, these situations can also occur normally. Describe a benign situation that could cause a protocol exchange to be incomplete
What will be an ideal response?
Computer Science & Information Technology
?An _____ style takes precedence over other styles defined in a style sheet.
A. ?embedded B. ?external C. ?inline D. ?internal
Computer Science & Information Technology