List of questions
Related questions
Question 152 - D-ISM-FN-23 discussion
What is the functionality of the lock in a cyber recovery process?
A.
Isolates network and prevent network from establishing an external connection
B.
Restricts overwriting of data to meet both corporate governance and compliance standards
C.
Determines if a replication copy contains malware or other anomalies
D.
Synchronizes the latest data and creates restore points
Your answer:
0 comments
Sorted by
Leave a comment first