You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a disaster recovery (DR) plan that will protect against the loss of critical data. The DR site must be at least 500 miles from your primary site and data transfer between the two sites must not traverse the public internet. The recommended disaster recovery plan is
<u>A. Create a new virtual cloud network (VCN) in the Phoenix region and create a subnet in one availability domain (AD) that is not currently being used by your production systems. Establish VCN peering between the production and DRsites.</u>
<u></u>
Explanation:
- Local VCN peering is the process of connecting two VCNs in the same region and tenancy so that their resources can communicate using private IP addresses without routing the traffic over the internet or through your on-premises network.
- You have a central VCN that has resources that you want to share with other VCNs.
- A VCN is a customizable private network in Oracle Cloud Infrastructure. Just like a traditional data center network, a VCN provides you with complete control over your network environment.
- A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network into multiple, smaller network segments.
- A VCN resides in a single Oracle Cloud Infrastructure region and covers a single, contiguous IPv4 CIDR block of your choice.
Answer:
B.
Explanation:
Computer manual is the user guide that comes along with the computer set to inform the users about the functions, ways to assemble the parts, and so on.
The user manual consists of guide for the users specially for electronic products such as computers, refrigerators; softwares, and so on. These manuals are written by technical writers, programmers, etc.
<u>In the given scenario the technician needs to refer to computer manual to know the meaning of the lights on the backside of the computer.</u>
So, the correct answer is option B.
Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)
<h3>What is Phishing?</h3>
Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.
To avoid phishing attacks, make sure you:
- understand what a phishing scheme looks like
- Please do not click on that link.
- Get anti-phishing add-ons for free.
- Don't provide your information to an untrusted website.
- Regularly change passwords.
- Don't disregard those updates.
- Set up firewalls.
- Don't give in to those pop-ups.
Learn more about Phishing:
brainly.com/question/23021587
#SPJ1
Full Question:
Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.
Which of the following security threats does this describe?
- Trojan
- Phishing
- Man-in-the-middle
- Zero-day attack