A. A backup is the source of Malware or illicit information.
B. A backup is unavailable during disaster recovery.
C. A backup is incomplete because no verification was performed.
D. An un-encrypted backup can be misplaced or stolen.
Scroll down for answer
The following books are highly recommended to progress your CEH v10 studies.
If the data written on the backup media is properly encrypted, it will be useless for anyone without the key.
CEH v10 EC Council questions and answers.
FREE PDF Download of all CEH v10 exam questions and answers.
Also see: Top Tips to Increase Your Online Privacy