Backup of the source data can be created
a) On the same device
b) On another device
c) At some other location
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter b) A composable component must be modularc) A composable component must be stateless d) None of the mentioned

Last Answer : A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

Description : .Point out the wrong statement. a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter b) A composable component must be modular c) A composable component must be stateless d) None of the mentioned

Last Answer : A cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

Description : Which of the following was one of the top 5 cloud applications in 2010? a) Cloud backup b) Web applications c) Business applications d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned

Last Answer : Both RPO & RTO

Description : Which of the following backup technique is most space efficient? a) Full backup b) Incremental backup c) Differential backup d) All of the mentioned

Last Answer : Incremental backup

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following backup technique is most space efficient? a) Full backup b) Incremental backup c) Differential backup d) All of the mentioned

Last Answer : Incremental backup

Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned

Last Answer : Both RPO & RTO

Description : ________ data represents more than 50 percent of the data created every day. a) Shadow b) Light c) Dark CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : Shadow

Description : ________ data represents more than 50 percent of the data created every day. a) Shadow b) Light c) Dark d) All of the mentioned

Last Answer : Shadow

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) JumpIt is an open-source virtual appliance installation and management service b) Converting a virtual appliance from one platform to another is easy proposition c ... vendors support OVF, notably VMware, Microsoft, Oracle, and Citrix d) All of the mentioned

Last Answer : Nearly all major virtualization platform vendors support OVF, notably VMware, Microsoft, Oracle, and Citrix

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Point out the wrong statement. a) Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM b) All CPUs support virtual machines c) On a Type 2 VM, ... is created that emulates the devices with which a system would normally interact d) All of the mentioned

Last Answer : All CPUs support virtual machines

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is the simplest unmanaged cloud storage device? a) file transfer utility b) antivirus utility c) online image utility d) none of the mentioned

Last Answer : none of the mentioned

Description : ________ is a server environment that does not physically exist but is created on another server. A. Physical machine. B. Logical machine. C. Guest machine. D. Virtual machine

Last Answer : Guest machine.

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Open source software used in a SaaS is called _______ SaaS. a) closed b) free c) open d) all of the mentioned

Last Answer : open

Description : Open source software used in a SaaS is called _______ SaaS. a) closed b) free c) open d) all of the mentioned

Last Answer : open

Description : Which of the following is an online backup and storage system? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Simple Notification Service d) Amazon Simple Storage System

Last Answer : Amazon Simple Storage System

Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned

Last Answer : PaaS systems offer a way to create user interfaces

Description : The client reading the data from HDFS filesystem in Hadoop a) gets the data from the namenode b) gets the block location from the datanode c) gets only the block locations form the namenode d) gets both the data and block location from the namenode

Last Answer : gets only the block locations form the namenode

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : hardware virtual machine

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : hardware virtual machine

Description : .Which of the following offering provides the tools and development environment to deploy applications on another vendor’s application. a) PaaS b) IaaS c ) SaaS d ) All of the mentioned

Last Answer : IaaS

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : VMM

Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned

Last Answer : Data centers have been sited to optimize the overall system latency

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : Which of the following aspect of the service is abstracted away? a) Data escrow b) User Interaction c) Adoption drivers d) None of the mentioned

Last Answer : User

Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned

Last Answer : compute

Description : The overhead associated with ____ staff is a major cost. a) Data Center b) IT c) Non IT d) All of the mentioned

Last Answer : IT

Description : Network bottlenecks occur when ______ data sets must be transferred. a) large b) small c) big d) all of the mentioned

Last Answer : large