B. Working copies are backups that are usually kept in the computer room for immediate use in recovering a system or lost file.
A. Large-scale database systems usually provide an audit file process that allows transactions to be recovered in the event of a data loss.
A. The Grandfather, Father, Son backup method is designed to provide a rotating schedule of backup processes. It allows for a minimum usage of backup media, and it still allows for long-term archiving.
C. Fail-over occurs when a system that is developing a malfunction automatically switches processes to another system to continue operations.
A. RAID 0 is a method of spreading data from a single disk over a number of disk drives. It's used primarily for performance purposes.
A. Code escrow allows customers to access the source code of installed systems under specific conditions, such as the bankruptcy of a vendor.
B. The acceptable-use policy dictates how computers can be used within an organization. This policy should also outline the consequences of misuse.
B. Due-care policies dictate the expected precautions to be used to safeguard client records.
A. A certificate policy dictates how an organization uses, manages, and validates certificates.
A. A security group is used to manage user access to a network or system.
A. DAC allows some flexibility in information-sharing capabilities within the network.
3.145.17.46