1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
15

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o

f all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the _________.(a) full backup
(b) incremental backup
(c) snmp (collect & organize data)
(d) priority code point (pcp)
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
8 0

Answer: (A) full backup

Explanation: A backup strategy is a term used to describe the various effective approach engaged in creating a backup for data or information.

A FULL BACK UP IS THE VARIOUS APPROACH AND SYSTEMS PUT IN PLACE BY A COMPUTER USER OR AN INFORMATION TECHNOLOGY EXPERT IN ORDER TO CREATE AN ADDITIONAL SAMPLE OR COPY OF AN INFORMATION OR A DATA IN S SINGLE BACKUP.

You might be interested in
PLEASE HELP ASAP<br> Which technology encrypts traffic between a web browser and a website?
scoundrel [369]

Answer:

The answer should be CloudFlare

8 0
2 years ago
Read 2 more answers
You are requesting information about wireless connectivity for your workplace computers. Because you expect the information to b
Sophie [7]

Answer:

the options to the question is:

a.In the introduction

b.In the body

c.In the conclusion

d.In the post script

Explanation:

The answer is A.

The letter would be better suited to have the request placed in the introduction as the introduction will give a brief of what the letter is all about.

The request cannot be in the body of the letter as the body of the letter is structured to contain the details about the request.

The request cannot be in the conclusion as the conclusion part of the letter is the ending part and it is more of a summary, rounding off the letter.

The request cannot be in the Post Script section of the letter as the post script is used to add additional information or detail to a letter.

5 0
3 years ago
Is frequency measured in henry.
soldier1979 [14.2K]
No its measured in Hertz Hz
5 0
3 years ago
How can earn more answer from brainly less than two minutes, please
Andrei [34K]
You have to answer other people’s questions.
6 0
3 years ago
Consider the following general code for allowing access to a resource:
Margaret [11]

Answer:

a) The code allows access even when  IsAccessAllowed(...) method fails.

b) Either use If

(dwRet = ACCESS_ALLOWED)

or use

if (dwRet == NO_ERROR)

to avoid flaw

Explanation:

Lets first see what the code chunk does:

DWORD dwRet = IsAccessAllowed(...);

if (dwRet == ERROR_ACCESS_DENIED) {

// Security check failed.

// Inform user that access is denied.

} else {

// Security check OK.

}

In the given code, DWORD is basically a data type for double word type integers and this is defined in windows.h

So there is DWORD type variable dwRet that is assigned a method calls.

The method is IsAccessAllowed() which checks if the access is allowed to user.

if (dwRet == ERROR_ACCESS_DENIED) condition basically checks if the value of DWORD type variable dwRet is equal to ERROR_ACCESS_DENIED

If this condition evaluates to true then the security checks fails and user is informed via some message or action that the access is denied.  But when the if condition evaluates to false then the else part executes which allows access.

So basically this chunk of code checks if the error ERROR_ACCESS_DENIED is returned.

Now the flaw in this program is what if the method IsAccessAllowed() by any reason. The reasons can be system failure or the memory failure. In memory failure case for example, the system returns out of memory error. So this means that the error is not  ERROR_ACCESS_DENIED. Instead it is out of memory error. So in such a case the user is allowed access as the if condition evaluates to false and else part executes. So if any other error is produced due to some reason like mentioned above, then user has unrestricted access.

This shows that the doe should not check for the failure or rely on checking ERROR_ACCESS_DENIED to allow access but instead it should check for success. Code should only give access privilege if access is allowed successfully or no error is produced.

So to avoid this flaw the code is altered as:

DWORD dwRet = IsAccessAllowed(...);

If (dwRet = ACCESS_ALLOWED) {

//Security check OK.

} else {

//Security check failed.

//Inform user that access is denied.

}

This will only allow access if ACCESS_ALLOWED evaluates to true and success is checked instead of failure here

You can also alter the if condition as:

If (dwRet = No_Error)

or

If (dwRet = 0)

The above if conditions checks if the access is allowed or if no error is produced. Only then it will allowed access otherwise not. So the access check is a success is checked first and failure (for any reason). The user is allowed access only if there is no error otherwise user is not allowed access.

6 0
3 years ago
Other questions:
  • How many times do you usually use npm?<br> Put your answer in the box.
    6·1 answer
  • 1. You can apply CSS formatting in which of the following ways?
    6·1 answer
  • The number of square units required to cover a surface.
    13·1 answer
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • Match each type of software license with the appropriate definition.
    11·1 answer
  • What is project management? A. Brainstorming ways to plan a project B. Executing, completing, and revising a project C. Managing
    10·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newlin
    6·1 answer
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!