True/False
The backup plan where hardware, software, and data are duplicated so that when one set is inoperable, the backup set can continue the processing is called redundancy.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q52: A control is a mechanism that is
Q53: Identification and authentication make use of _.
Q54: Identification and authentication make use of_ ,
Q55: When the database and software library are
Q56: Which of the following is not a
Q58: Which type of control is built into
Q59: Cryptography is the use of coding by
Q60: Identify the four steps of information security
Q61: What are the 10 security- related practices
Q62: The information security objective of confidentiality means