What is the functionality of the lock in a cyber recovery process?
A.
Isolates network and prevent network from establishing an external connection
B.
Restricts overwriting of data to meet both corporate governance and compliance standards
C.
Determines if a replication copy contains malware or other anomalies
D.
Synchronizes the latest data and creates restore points
The Answer Is:
B
This question includes an explanation.
Explanation:
The lock functionality in a cyber recovery process is primarily designed to restrict the overwriting of data to meet both corporate governance and compliance standards. This is crucial for ensuring the integrity and availability of data in the event of a cyber incident. The lock prevents unauthorized changes to the data, ensuring that the recovery point remains pristine and reliable for restoration purposes. This functionality is vital for meeting compliance requirements, which often mandate that data be protected from unauthorized alteration.
References:
Dell EMC Information Storage and Management (ISM) v5, Module on Cyber Recovery Solutions, specifically the sections on data integrity and compliance.
D-ISM-FN-23 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"