The programs you need for you are not even done yet
The themes gallery is located on the "design" ribbon tab
Answer and Explanation:
Backup control within the SAN is one which confines the backup to the SAN and does not pass it via corporate network.
Backup traffic within the SAN are easier to maintain and easily handled in contrast to the application server.
Backup in SAN is governed by such applications and mechanism which allows the easy handling of the backup traffic which is not provided by the application servers.
In case of occurrence of any failure, unlike application server, SAN provides smooth and fast migration
SAN holds data in cluster by the use of backup techniques not used in application server.
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.